Describe the methods used in each of the following protocols to prevent a replay attack:
a. Kerberos authentication
b. SET
c. Electronic cash
a. Authenticator
b. Transaction number
c. The bank keeps a list of tokens that have been deposited and will not deposit the same token twice.
Computer Science & Information Technology
You might also like to view...
C#, string objects have a method named ____________ that is used to tokenize strings.
a. Tokenize b. Delimit c. Break d. Split
Computer Science & Information Technology
In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology