Back to Results
First PageMeta Content
Cryptography standards / WS-Security / XML Signature / XML / WS-SecureConversation / SOAP / Advanced Encryption Standard / Canonicalization / Web service / Cryptography / Computing / Public-key cryptography


Document Date: 2009-10-26 20:48:56


Open Document

File Size: 102,61 KB

Share Result on Facebook

City

Venice / Pittsburgh / /

Company

AES / Distributed Brokering Systems / BouncyCastle / /

Country

Italy / /

/

Facility

University Address Line / Indiana University / /

IndustryTerm

transportation / implemented cryptography algorithms / Web Services Security Hongbin Liu Shrideep Pallickara Geoffrey Fox Indiana University Address Line / service invocation chain / low resolution timing1 machinery / compositional services / transportation paradigm / derivation algorithm / communication protocol / Wireless Communications / symmetric encryption algorithms / Web services security specifications / wire transportation / phash algorithm / c14n processing / Web services project / point-to-point solution / Web services security performances / security processing time / cryptography algorithms / encryption algorithms / end services / receiver processing / Web Service Security Abstraction / Web services security / Web services / /

OperatingSystem

Linux / Windows XP / Microsoft Windows / /

Organization

Indiana University / Community Grid Lab / /

ProgrammingLanguage

Java / XML / /

ProvinceOrState

Indiana / Pennsylvania / /

Technology

XML / encryption algorithms / Linux / Wireless Communications / existing technologies / VPN / data encryption / CORBA / Operating system / SSL / implemented cryptography algorithms / cryptography algorithms / two algorithms / encryption / cryptography / Symmetric encryption / Java / firewall / phash algorithm / symmetric encryption algorithms / key derivation algorithm / communication protocol / DOM / Digital Signature / Document Object Model / existing XML Digital Signature / /

URL

http /

SocialTag