Attacking Authentication Protocols

@inproceedings{Clark1996AttackingAP,
  title={Attacking Authentication Protocols},
  author={John A. Clark and Jeremy L. Jacob},
  year={1996}
}
The past two decades have seen an enormous increase in the development and use of networked and distributed systems, providing increased functionality to the user and more efficient use of resources. To obtain the benefits of such systems parties will cooperate by exchanging messages over the network. The parties may be users, hosts or processes; they are generally referred to as principals in authentication literature. Principals use the messages received, together with certain modelling… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 20 CITATIONS

Some New Multi-Protocol Attacks

  • 15th International Conference on Advanced Computing and Communications (ADCOM 2007)
  • 2007
VIEW 2 EXCERPTS

References

Publications referenced by this paper.
SHOWING 1-10 OF 30 REFERENCES