Please use this identifier to cite or link to this item:
Title: Replay tolerance of authentication protocols
Authors: Lam, K.-Y. 
Keywords: authentication protocols
computer communication
network security
Issue Date: Dec-1995
Source: Lam, K.-Y. (1995-12). Replay tolerance of authentication protocols. Computer Communications 18 (12) : 988-992. ScholarBank@NUS Repository.
Abstract: This research note addresses the problem of message replay in distributed authentication. It discusses the merits and defeats of three most widely accepted approaches to the replay problem. It then presents a different approach which, though difficult to achieve in practice, has been accepted to be most tolerant to replays in distributed systems. This note also describes a practical implementation of this replay-tolerance approach. © 1995.
Source Title: Computer Communications
ISSN: 01403664
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.

Page view(s)

checked on Mar 8, 2018

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.