Map
Index
Random
Help
th

Quote: an active adversary can see and modify all communications traffic; e.g., a proxy service and man-in-the-middle attacks

topics > all references > references e-f > QuoteRef: fuK8_2001 , p. 254



Topic:
security leaks and weaknesses
Topic:
authentication

Quotation Skeleton

The active adversary can in addition [to eavesdropping and adaptive chosen message attacks] see and modify all traffic between the user and the … the adversary controls a proxy service between the …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: security leaks and weaknesses (56 items)
Topic: authentication (87 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.