Back to Results
First PageMeta Content
Information / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Yahalom / Wide Mouth Frog protocol / Replay attack / Public-key cryptography / Kerberos / Cryptographic nonce / Cryptographic protocols / Cryptography / Data


Pranav Vyas, Dr. Bhushan Trivedi / International Journal of Engineering Research and Applications (IJERA) ISSN: [removed]www.ijera.com
Add to Reading List

Document Date: 2012-11-17 00:05:41


Open Document

File Size: 396,20 KB

Share Result on Facebook

City

Pairing / /

Company

Wireless Mobile Networks / Digital Equipment Corp. Systems / IBM / Privacy Enhancing Technologies / Needham / /

Country

United Kingdom / /

Event

FDA Phase / Employment Change / Person Communication and Meetings / /

Facility

Dr. Bhushan Trivedi** *(Smt.Chandaben Mohanbhai Patel Institute Of Computer Application / Charotar University Of Science And Technology / University of Waterloo Centre / GLS Institute Of Computer Technlogy / University of Leicester / Massachusetts Institute of Technology / /

IndustryTerm

agreement protocols / insecure public network / nonce based protocols / Wireless Communications / symmetric key protocols / mobile ad-hoc networks / hidden services / session key protocol / secure time server / mobile service operator / security protocols / authentication protocol / wireless network / simplest symmetric key-management protocol / session key exchange protocols / public network / wide mouth frog protocol / ad hoc networks / onion router / public networks / authentication protocols / insecure networks / /

OperatingSystem

DOS / /

Organization

Cambridge University / University of Leicester / Trent / Chandaben Mohanbhai Patel Institute of Computer Application / Massachusetts Institute of Technology / USENIX Association / Department of Mathematics and Computer Science / MIT / Charotar University of Science And Technology / GLS Institute of Computer Technlogy / University of Waterloo Centre for Applied Cryptographic Research / IEEE Computer Society / /

Person

Greg M. Zaverucha / Yung-Hsiang Chen / Mizanur Rahman / Bhushan Trivedi / Minyi Guo / Douglas Stebila / Canetti / Hung-Yu Chien / Tzonelih Hwang / Narn-Yoh Lee / Aniket Kate / Eiji Okamoto / Zili Shao / Hyoung Joong Kim / Ren / Qiang Tang / Alfred J. Menezes / Chuang-Ming Li / Victor Shoup / Roger Dingledine / Kim-Kwang Raymond Choo / Paul Syverson / Laurence Yang / Gavin Lowe / Takeshi Okamoto / Nick Mathewson / Proc / Edwin Sha / Philippe Golle / Berkant Ustaoglu / Sherman S. M. Chow / Seong-Dong Kim / Ulf Carlsen / Ian Goldberg / Lenstra / Richard Comley / Hugo Krawczyk / Atsuo Inomata / Jong-Suk Chae / Secrecy Keywords / Alice / T. Trent / Markus Jakobsson / Bruce Schneier / Ming-Yung Ko / Masahiro Mambo / Alice Bob / /

Position

Jesse walker / editor / Formal Model / / Forward / /

Product

RFC-5106 / Multiple Authentications / /

ProvinceOrState

Massachusetts / /

PublishedMedium

Communications of the ACM / /

Technology

session key exchange protocols / pp.658-663 An Analysis Of Session Key Exchange Protocols / key exchange protocol / 2.2 Neuman-Stubblebine This protocol / security protocols / secret key / communication Parameters/Protocols / Stubblebine Authentication Protocols / 2.1 Wide Mouth Frog protocol / Encryption / wide mouth frog protocol / cryptography / simplest symmetric key-management protocol / analyzing key agreement protocols / second-generation onion router / authentication protocols / 4.1 Wide Mouth Protocol This protocol / 2.4 Denning Sacco Protocol This protocol / 5 protocol / nonce based protocols / name Encryption / Needdham-Schroeder protocol / fo KeyExchange Protocols / symmetric key protocols / key-exchange protocol / Anonymous Authentication using DAA-SIGMA Protocol / private key / 4.4 Denning-Sacco Protocol Denning Sacco protocol / Operating Systems / 4.2 Neuman-Stubbleine Protocol / Wi-FI / Tor authentication protocol / public key / Denning-Sacco protocol / Neuman-Stubblebine protocol / The Wide-Mouth Frog protocol / exchange protocols / simulation / session key protocol / /

URL

www.ijera.com / /

SocialTag