Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Logic of authentication

An interesting similar approach was taken in [SyMe93] for key-distribution protocols usually treated with logics of authentication see the remarks on those in Section 5.2.1. [Pg.48]

Logic specification of signature schemes may sound rather similar to the logics of authentication, often called BAN logic, from [BuAN90] and many subsequent articles. However, the purpose and consequently the approach are quite different. This is natural, because these logics were primarily designed to find errors in key-distribution protocols with symmetric schemes, which they do successfully. [Pg.58]

Logics of authentication are used to specify and prove protocols using cryptologic primitives, whereas here, the signature schemes themselves are to be specified. [Pg.58]

AbTu91 Martin Abadi, Mark R. Tuttle A Semantics for a Logic of Authentication 10th Symposium on Principles of Distributed Computing (PoDC), 1991, ACM, New York 1991, 201-216. [Pg.371]

BuAN90 Michael Burrows, Martin Abadi, Roger Needham A Logic of Authentication ACM Transactions on Computer Systems 8/1 (1990) 18-36. [Pg.373]

An electronic signature is a legal concept that was defined in [DIR] as data in electronic form that is attached to, or logically associated with, other electronic data, and which serve as a method of authentication. That definition has a very wide sense to be open to various technologies, both current ones and those that may come in future. An electronic signature refers to data authentication, not to the authentication of entities. [Pg.315]

The only exception is that authentication need not work if the message bound N has been reached. Expressing this condition in temporal. logic is probably not the most natural way, but it can be done with a flexible variable counter (i.e., counter may assume different values in different rounds — this is the opposite of a rigid variable), which is formally used to count executions of authentication. [Pg.86]

Table 7.2 Authentication of mono varietal virgin olive oils comparative results of fuzzy logic algorithms (Calvente and Aparicio, 1995) and the supervised chemometric procedure of linear discriminant analysis. Chemical compounds used linolenic acid, 24-methylen-cycloarthanol sterol and copaene hydrocarbon... Table 7.2 Authentication of mono varietal virgin olive oils comparative results of fuzzy logic algorithms (Calvente and Aparicio, 1995) and the supervised chemometric procedure of linear discriminant analysis. Chemical compounds used linolenic acid, 24-methylen-cycloarthanol sterol and copaene hydrocarbon...
Logical security must provision authentication, authorization, confidentiality, and integrity, protection of privacy, nonrepudiation, and availability. Logical IT security services are briefly described below ... [Pg.245]

For the traffic injection attack it is required to make the system board invisible for the authorized host and the authenticator switch. For this reason, the system board is configured as a logical bridge. A bridge connects different network segments in the data link layer (layer 2 of OSI model). If a layer 2 packet received in one interface has a destination MAC address of a device reachable through another interface, it is forwarded to that interface. As a result, data traffic between authorized host and the authenticator switch is forwarded by the system board without any modification. [Pg.1809]

The certificate used for authentication (and its associated private key) in the diagnostics equipment is critical to the safety of the vehicle, since the loss of them can lead to impersonation, which can result in unauthorised access to vehicles. The threats against the diagnostics equipment can be of both physical and logical nature [2] ... [Pg.73]

Logical Threats. An attacker is assumed to be able to copy the authentication keys within the diagnostics equipment. It is then possible to use/have any type of equipment to authenticate as diagnostics equipment to any vehicle at any time. [Pg.73]


See other pages where Logic of authentication is mentioned: [Pg.58]    [Pg.58]    [Pg.58]    [Pg.58]    [Pg.58]    [Pg.58]    [Pg.253]    [Pg.224]    [Pg.178]    [Pg.46]    [Pg.13]    [Pg.64]    [Pg.348]    [Pg.405]    [Pg.409]    [Pg.50]    [Pg.23]    [Pg.13]    [Pg.11]    [Pg.145]    [Pg.58]    [Pg.242]    [Pg.33]    [Pg.173]    [Pg.145]    [Pg.39]    [Pg.55]    [Pg.82]    [Pg.64]    [Pg.117]    [Pg.183]    [Pg.43]    [Pg.635]    [Pg.35]    [Pg.437]    [Pg.219]   
See also in sourсe #XX -- [ Pg.58 ]




SEARCH



Authenticity

© 2024 chempedia.info