Describe the methods used in each of the following protocols to prevent a replay attack:

a. Kerberos authentication
b. SET
c. Electronic cash

a. Authenticator
b. Transaction number
c. The bank keeps a list of tokens that have been deposited and will not deposit the same token twice.

Computer Science & Information Technology

You might also like to view...

C#, string objects have a method named ____________ that is used to tokenize strings.

a. Tokenize b. Delimit c. Break d. Split

Computer Science & Information Technology

In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology