Describe the methods used in each of the following protocols to prevent a replay attack:

a. Kerberos authentication
b. SET
c. Electronic cash


a. Authenticator
b. Transaction number
c. The bank keeps a list of tokens that have been deposited and will not deposit the same token twice.

Computer Science & Information Technology

You might also like to view...

Data in tables can be sorted in ascending or ________ order

Fill in the blank(s) with correct word

Computer Science & Information Technology

Comparison operators are used to compare two values

Indicate whether the statement is true or false

Computer Science & Information Technology

A ________ contains the field name, followed by a colon, then an expression

A) calculated field B) date field C) header field D) footer field

Computer Science & Information Technology

A company recently experienced a break-in, whereby a number of hardware assets were stolen through unauthorized access at the back of the building. Which of the following would BEST prevent this type of theft from occurring in the future?

A. Motion detection B. Perimeter fencing C. Monitored security cameras D. Badged entry

Computer Science & Information Technology