Search
Now showing items 1-4 of 4
Key-spoofing attacks on nested signature blocks
(1995)
For a given signature block and any other data, there exists a key which produces the same signature block. The threat that this poses to schemes which use nested signature blocks as pointers to other tokens is identified, ...
Roles and rights
(University of Hertfordshire, 1995)
In this paper we describe and discuss a protection model designed by Coulouris and Dollimore to protect objects which are shared by different principals participating in a co-operative task. We then show that the ...
Authentication v Certification
(University of Hertfordshire, 1995)
Authentication servers and certification authorities are usually viewed simply as alternative ways of providing the same service. In this paper we show that the differences in the natures of these two approaches are more ...
Nested signature blocks
(University of Hertfordshire, 1995)
For any signature block and any other data, there exists a key which produces the same signature block. In this report we identify the threat that this poses for the SAProxy scheme which uses nested signature blocks as ...