Please use this identifier to cite or link to this item:
|Title:||Replay tolerance of authentication protocols||Authors:||Lam, K.-Y.||Keywords:||authentication protocols
|Issue Date:||Dec-1995||Citation:||Lam, K.-Y. (1995-12). Replay tolerance of authentication protocols. Computer Communications 18 (12) : 988-992. ScholarBank@NUS Repository.||Abstract:||This research note addresses the problem of message replay in distributed authentication. It discusses the merits and defeats of three most widely accepted approaches to the replay problem. It then presents a different approach which, though difficult to achieve in practice, has been accepted to be most tolerant to replays in distributed systems. This note also describes a practical implementation of this replay-tolerance approach. © 1995.||Source Title:||Computer Communications||URI:||http://scholarbank.nus.edu.sg/handle/10635/99401||ISSN:||01403664|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on Mar 28, 2020
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.