Replay attack

Results: 25



#Item
11Public-key cryptography / Grader / Replay attack / Cryptography / Cryptographic protocols / Alice and Bob

Distributed Proctoring Bruce Schneier ? John Kelsey

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
12Cryptographic protocols / Hashing / Replay attack / Security token / RSA / SHA-1 / Trusted timestamping / Interlock protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Automatic Event-Stream Notarization Using Digital Signatures Bruce Schneier John Kelsey

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
13Replay attack / Public-key cryptography / Kerberos / Payment systems / Cryptography / Cryptographic hash function / Hashing

A Peer-to-Peer Software Metering System John Kelsey Bruce Schneier {kelsey,schneier}@counterpane.com Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
14Information / Man-in-the-middle attack / Alice and Bob / Wide Mouth Frog protocol / Replay attack / Blind signature / Burrows–Abadi–Needham logic / Public-key cryptography / Communications protocol / Cryptography / Cryptographic protocols / Data

Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
15Trusted computing / Complexity classes / Formal verification / Trusted Execution Technology / Trusted Platform Module / Adversary model / Replay attack / Interrupt / IP / Theoretical computer science / Cryptography / Applied mathematics

Systematic Treatment of Remote Attestation Aurelien Francillon Networking and Security Group Eurecom Instutute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-20 17:27:19
16Data / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / IP / Communications protocol / Replay attack / Distance-bounding protocol / Cryptography / Cryptographic protocols / Information

Scalable Grouping-proof Protocol for RFID Tags Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction Dang Nguyen Duc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-09 01:55:21
17Transmission Control Protocol / Password / Replay attack / Cyberwarfare / Computing / Computer security / Computer network security / Internet protocols / Internet standards / Advanced Encryption Standard / EMC Corporation / SecurID

[removed] Weaknesses in SecurID by [removed] This paper was composed for Secure Networks Inc. as research for a commercial

Add to Reading List

Source URL: www.tux.org

Language: English - Date: 1997-08-01 00:33:00
18Computer network security / XKMS / Information / Cryptographic nonce / Challenge-response authentication / Replay attack / Cryptographic protocols / Cryptography / Cyberwarfare

CHAPTER 5. SECURITY CONSIDERATIONS 34 service because the Web service only knows this secret key: nonce = time + serial number + M AC(time + serial number, secret key)

Add to Reading List

Source URL: lists.w3.org

Language: English - Date: 2015-01-08 21:59:19
19Identity management / Security token / One-time password / Electronic authentication / Authentication / Multi-factor authentication / Password / Identity assurance / Replay attack / Security / Computer security / Cryptography

[removed][removed][removed]New York State Information Technology Standard No: NYS-S14-006

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-08-15 15:51:22
20Identity management / Security token / One-time password / Electronic authentication / Authentication / Multi-factor authentication / Password / Identity assurance / Replay attack / Security / Computer security / Cryptography

[removed][removed][removed]New York State Information Technology Standard No: NYS-S14-006

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-08-15 15:51:22
UPDATE