aller au contenu
Imperfect forward secrecy: How diffie-hellman fails in practice
FermerAperçu de cet ouvrage
Vérification...

Imperfect forward secrecy: How diffie-hellman fails in practice

Auteur : Bhargavan K.Gaudry P.Thome E.Zimmermann P.Zanella-Beguelin S.Tous les auteurs
Édition/format: Article Article : English
Source:Proceedings of the ACM Conference on Computer and Communications Security, v2015-October (2015 10 12): 5-17
Évaluation:

(pas encore évalué) 0 avec des critiques - Soyez le premier.

&AllPage.SpinnerRetrieving;

Trouver un exemplaire en ligne

Liens vers cette revue/publication

Trouver un exemplaire dans la bibliothèque

&AllPage.SpinnerRetrieving; Recherche de bibliothèques qui possèdent cet ouvrage...

Détails

Type de document: Article
Tous les auteurs / collaborateurs: Bhargavan K.; Gaudry P.; Thome E.; Zimmermann P.; Zanella-Beguelin S.; Heninger N.; Valenta L.; Green M.; Adrian D.; Durumeric Z.; Halderman J.A.; Springall D.; VanderSloot B.; Wustrow E.
ISSN:1543-7221
Note sur la langue: English
Identificateur Unique : 5979157254
Récompenses:

Critiques

Critiques d’utilisateurs
Récupération des critiques de GoodReads...
Récuperation des critiques DOGObooks…

Marqueurs

Soyez le premier.
Confirmez cette demande

Vous avez peut-être déjà demandé cet ouvrage. Veuillez sélectionner OK si vous voulez poursuivre avec cette demande quand même.

Données liées


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/5979157254<\/a>> # Imperfect forward secrecy: How diffie-hellman fails in practice<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Article<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"5979157254<\/span>\" ;\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"949 $l Conference paper<\/span>\" ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/durumeric_z<\/a>> ; # Durumeric Z.<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/springall_d<\/a>> ; # Springall D.<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/gaudry_p<\/a>> ; # Gaudry P.<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Meeting\/22nd_acm_sigsac_conference_on_computer_and_communications_security_ccs_2015_22_2015_10_12_2015_10_16<\/a>> ; # 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 22 2015 10 12 - 2015 10 16<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/adrian_d<\/a>> ; # Adrian D.<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/valenta_l<\/a>> ; # Valenta L.<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/<\/a>> ; # <\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/thome_e<\/a>> ; # Thome E.<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/vandersloot_b<\/a>> ; # VanderSloot B.<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/halderman_j_a<\/a>> ; # Halderman J.A.<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/zanella_beguelin_s<\/a>> ; # Zanella-Beguelin S.<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/wustrow_e<\/a>> ; # Wustrow E.<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/heninger_n<\/a>> ; # Heninger N.<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/green_m<\/a>> ; # Green M.<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/zimmermann_p<\/a>> ; # Zimmermann P.<\/span>\n\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/bhargavan_k<\/a>> ; # Bhargavan K.<\/span>\n\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/<\/a>> ; # <\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2015-10-12<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/2899385878<\/a>> ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/worldcat.org\/issn\/1543-7221#2015-October<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Imperfect forward secrecy: How diffie-hellman fails in practice<\/span>\" ;\u00A0\u00A0\u00A0\nschema:pageStart<\/a> \"5<\/span>\" ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"5979157254<\/span>\" ;\u00A0\u00A0\u00A0\nschema:sameAs<\/a> <http:\/\/dx.doi.org\/10.1145\/2810103.2813707<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/5979157254<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Agent\/association_for_computing_machinery<\/a>> # Association for Computing Machinery<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Association for Computing Machinery<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Meeting\/22nd_acm_sigsac_conference_on_computer_and_communications_security_ccs_2015_22_2015_10_12_2015_10_16<\/a>> # 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 22 2015 10 12 - 2015 10 16<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Meeting<\/a>, schema:Event<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 22 2015 10 12 - 2015 10 16<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/<\/a>> # <\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/adrian_d<\/a>> # Adrian D.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Adrian D.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/bhargavan_k<\/a>> # Bhargavan K.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Bhargavan K.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/durumeric_z<\/a>> # Durumeric Z.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Durumeric Z.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/gaudry_p<\/a>> # Gaudry P.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Gaudry P.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/green_m<\/a>> # Green M.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Green M.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/halderman_j_a<\/a>> # Halderman J.A.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Halderman J.A.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/heninger_n<\/a>> # Heninger N.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Heninger N.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/springall_d<\/a>> # Springall D.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Springall D.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/thome_e<\/a>> # Thome E.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Thome E.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/valenta_l<\/a>> # Valenta L.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Valenta L.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/vandersloot_b<\/a>> # VanderSloot B.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"VanderSloot B.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/wustrow_e<\/a>> # Wustrow E.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Wustrow E.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/zanella_beguelin_s<\/a>> # Zanella-Beguelin S.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Zanella-Beguelin S.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Person\/zimmermann_p<\/a>> # Zimmermann P.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Zimmermann P.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/issn\/1543-7221<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Periodical<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Proceedings of the ACM Conference on Computer and Communications Security<\/span>\" ;\u00A0\u00A0\u00A0\nschema:issn<\/a> \"1543-7221<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2899385878#Agent\/association_for_computing_machinery<\/a>> ; # Association for Computing Machinery<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/issn\/1543-7221#2015-October<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationVolume<\/a> ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/worldcat.org\/issn\/1543-7221<\/a>> ;\u00A0\u00A0\u00A0\nschema:volumeNumber<\/a> \"2015-October<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n