Map
Index
Random
Help
th

Quote: key continuity is vulnerable to man-in-the-middle attacks; unlikely; e.g., credit cards have not been intercepted

QuoteRef: gutmP2_2004 , p. 101



Topic:
public key encryption

Quotation Skeleton

The problem with [key continuity] is that it's vulnerable … communicating parties. … In practice, as Ian Grigg notes, the magnitude … an MITM interception of a credit card sent …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: public key encryption (30 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.