Back to Results
First PageMeta Content
Two-man rule / Safety / IEEE 802.1X / Kerberos / Authenticator / Security / Computer network security


Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor? John Kelsey Bruce Schneier
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 139,98 KB

Share Result on Facebook

City

Minneapolis / /

Company

Authenticated Software / Walker Digital Inc. / SKA and associates / Starting Authenticated Software / John Kelsey Bruce Schneier Counterpane Systems / /

Country

United States / /

/

Event

FDA Phase / Business Partnership / /

Facility

Internet terminal / /

IndustryTerm

entertainment software / joystick systems / computer network / digital signature algorithms / meterable software / online games / software meter / home game systems / manufacturing time / regular input device / communications link / insecure communications / Internet terminal / software programs / executable software / distributed computing / telephone line / metered software application / software execution / software program / software metering / telephone keypad / exhaustive search / metered software / game software / software item / authenticatable software / /

Person

P KCC / IDA KCC / /

Product

Authenticator / In2 / /

ProvinceOrState

Minnesota / /

Technology

encryption / cryptography / RAM / 5 Protocols Protocols / public key / Program protocol / disk drive / encryption system / smart card / digital signature algorithms / private key / secret key / main protocol / 5.2 Encryption / Flash / Public key encryption / /

SocialTag