Map
Index
Random
Help
th

Quote: an interrogative adversary uses adaptive chosen message attacks; every user on the Web, powerful; e.g., attempted forgeries and creating new accounts

topics > all references > references e-f > QuoteRef: fuK8_2001 , p. 251



Topic:
authentication

Quotation Skeleton

the Web is particularly vulnerable to adaptive chosen … for most systems, every user is potentially an … [p. 254] The interrogative adversary can make a reasonable … the answer to a previous query. … The ability to make queries is surprisingly powerful. … a server, the adversary can obtain the authenticator …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: authentication (87 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.