![Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Cryptographic hash function / Security token / Hash chain / Transport Layer Security / Cryptographic nonce / Computing / Cryptography / Internet Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Cryptographic hash function / Security token / Hash chain / Transport Layer Security / Cryptographic nonce / Computing / Cryptography / Internet](https://www.pdfsearch.io/img/7c61c3128647ca6965e90863e0eef2c7.jpg)
| Document Date: 2014-07-20 15:18:58 Open Document File Size: 539,29 KBShare Result on Facebook
Company IBM / iHTTP / SINE / NCSU Secure Open Systems / / Country United States / / Currency USD / / / Event Reorganization / / Facility North Carolina State University / / IndustryTerm hash chain / origin server / web content / authentication/integrity techniques server / victim router / vulnerabilities targeting web applications / security protocols / / NaturalFeature Data Streams / / Organization U.S. Army Research Office / North Carolina State University / Raleigh / IBM Open Collaboration Faculty / U.S. National Science Foundation / / ProgrammingLanguage HTML / / Technology public key / DNS / victim router / HTTP 1.1 / Private Key / security protocols / caching / HTML / digital signature / SSL / WAN / /
SocialTag |