First Page | Meta Content | |
---|---|---|
![]() | Document Date: 2005-05-17 17:24:40Open Document File Size: 317,08 KBShare Result on FacebookFacilityUniversity Abstract / /IndustryTermsignature verification algorithms / proactive systems / cryptographic tools / important cryptographic tool / futuristic e-commerce / security systems / particular protocol / update algorithm / important tool / weak portable devices / /OrganizationNational Science Foundation / Boston University / /PersonGene Itkis / Ross Anderson / Adam Back / /Positionattorney / Miner / straight-forward / Forward / experienced security systems designer / /ProvinceOrStateSaskatchewan / /Technologyencryption / Cryptography / Forward-secure public key encryption / signature verification algorithms / public key / signing algorithm / Forward-secure encryption / 8 Forward-Secure Public Key Encryption / PKI / key exchange protocols / particular protocol / key update algorithm / ElGamal/DH encryption / private key / secret key / digital cash / digital signature / SSL / two algorithms / /SocialTag |