Back to Results
First PageMeta Content
Cipher / Encryption / Key / Three-pass protocol / Threshold cryptosystem / Cryptography / Public-key cryptography / Ciphertext


Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten
Add to Reading List

Document Date: 2014-04-02 08:24:08


Open Document

File Size: 878,87 KB

Share Result on Facebook

Company

IBM / L. 2 / L. / I. / /

/

Event

FDA Phase / Person Communication and Meetings / /

IndustryTerm

tamper resistant hardware / Secure protocols / secure systems / cloud server / cryptographic tools / on-line auditability guarantees / log server / verification algorithm / straightforward protocols / on-line auditing checks / phone carrier / on-line checks / final protocol / abstract protocol / multi-party protocol / cryptographic protocols / telecommunications carriers / secure co-processor / telecommunications / tamper-resistant hardware / public audit / software service / law enforcement / particular protocol / telecommunications databases comprising billions / /

Organization

Si / UN Court / /

Person

Dan Boneh / Joshua A. Kroll / Edward W. Felten / /

Position

investigator / data custodian / auditor / General Counsel / intelligence analyst / analyst / Private / judge / /

Product

CryptoCard secure co-processor / D1 / CryptoCard / /

ProgrammingLanguage

C / /

SportsEvent

skL / /

Technology

three algorithms / a third protocol / CryptoCard secure co-processor / private key / distributed protocol / secret key / Labeled public-key encryption / encryption / cryptography / multi-party protocol / TLS protocol / public key / signing algorithm / abstract protocol / particular protocol / verification algorithm / encryption system / final two protocols / third protocol / digital signature / fifth protocols / proposed protocol / present five protocols / /

SocialTag