Back to Results
First PageMeta Content
Computing / Kerberos / Integrated Windows Authentication / Single sign-on / Authentication server / Secure Shell / Authentication / AKA / Proxy server / Cryptography / Computer network security / Computer security


Symmetric and Asymmetric Authentication: A Study of Symmetric and Complementary Properties and Their Effect on Interoperability and Scalability in Distributed Systems Olga Kornievskaia
Add to Reading List

Document Date: 2002-06-12 12:33:53


Open Document

File Size: 635,23 KB

Share Result on Facebook

Company

Single Signon Systems / /

/

Event

FDA Phase / /

Facility

University of Michigan / University of Michigan June / /

IndustryTerm

distributed authentication protocol / symmetric key authentication protocol / asymmetric authentication protocol / authentication protocol / interoperability tools / secure systems / authentication systems / symmetric key infrastructure / public key base authentication services / secure file systems / Web certificates / public key infrastructure / Web server serves / given authentication protocol / proxy server / trusted server / client-server authentication protocol / unreliable networks / Web browser / distributed authentication protocols / Web Server / secure hardware / secure email protocols / parallel processing resources / symmetric authentication protocol / public key authentication protocol / Web access / encryption algorithm / legacy applications / authentication protocols / real-time involvement / /

OperatingSystem

UNIX / /

Organization

K. Trusted Third Party / Key Management Service / the University of Michigan / /

Person

Paul Resnick Carl Ellison / Brian Noble Atul Prakash Paul / Robert Heinlein / Peter Honeyman / /

Position

Advisor / Private / /

Product

symmetric / /

ProvinceOrState

Michigan / /

Technology

Encryption / Symmetric key encryption / S/MIME / client-server authentication protocol / given authentication protocol / authentication protocol / cryptography / Public Key Infrastructure / public key / proxy server / authentication protocols / peer-to-peer / encryption algorithm / public key authentication protocol / PKI / VPN / symmetric key authentication protocol / K. Asymmetric key encryption / secure email protocols / symmetric authentication protocol / smart card / private key / distributed authentication protocols / SSL / same distributed authentication protocol / parallel processing / Web Server / asymmetric authentication protocol / public key encryption / /

SocialTag