Security question

Results: 867



#Item
81

2011 Paper 7 Question 12 Security II (a) Write out the Needham–Schroder protocol, explaining the notation you use. [5 marks] (b) Describe the “bug” in the protocol, stating why some people consider it to be

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2014-06-09 10:18:39
    82

    2004 Paper 8 Question 6 Security A car locking system consists of an engine management system E which shares a key K with a microcontroller M embedded in the key fob. When an attempt is made to open the door, a challeng

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2014-06-09 10:18:01
      83

      Forum: Security Council Issue: The Question of the Crimean Crisis Student Officer: Daniella Pauly (President) Position: President of the Security Council Introduction

      Add to Reading List

      Source URL: www.youcee.eu

      - Date: 2014-07-09 09:34:20
        84

        2006 Paper 8 Question 7 Security The Needham–Schroeder protocol is defined as 1. A −→ S : A, B, NA 2. S −→ A : {NA , B, KAB , {KAB , A}KBS }KAS

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        - Date: 2014-06-09 10:18:14
          85

          2005 Paper 7 Question 4 Security (a) Describe briefly security policy models that might be suitable for protecting (i ) medical records;

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          - Date: 2014-06-09 10:18:06
            86

            1997 Paper 7 Question 9 Security Describe the following modes of operation of a block cipher: electronic codebook, cipher block chaining, output feedback, cipher feedback, message authentication code and hash function.

            Add to Reading List

            Source URL: www.cl.cam.ac.uk

            - Date: 2014-06-09 10:17:16
              87

              Issue: The question of giving a seat in the Security Council to the economic and political Unions Forum:

              Add to Reading List

              Source URL: www.youcee.eu

              Language: English - Date: 2014-07-09 09:32:35
                88

                1996 Paper 7 Question 9 Security Describe the Clark–Wilson security policy model, and discuss how it might typically be applied. [12 marks]

                Add to Reading List

                Source URL: www.cl.cam.ac.uk

                - Date: 2014-06-09 10:17:11
                  89

                  2005 Paper 8 Question 6 Security A mobile telephone company has 5 million prepay customers who buy scratchcards to pay for air time. Each card has a code of 9 decimal digits, and at any time there are about 20 million c

                  Add to Reading List

                  Source URL: www.cl.cam.ac.uk

                  Language: English - Date: 2014-06-09 10:18:08
                    90

                    1996 Paper 9 Question 9 Security Shamir’s three-pass protocol enables Alice to send a message m to Bob in the following way: A → B : mka

                    Add to Reading List

                    Source URL: www.cl.cam.ac.uk

                    - Date: 2014-06-09 10:17:13
                      UPDATE