Matches in DBpedia 2014 for { <http://dbpedia.org/resource/Wide_Mouth_Frog_protocol> ?p ?o. }
Showing items 1 to 23 of
23
with 100 items per page.
- Wide_Mouth_Frog_protocol abstract "The Wide-Mouth Frog protocol is a computer network authentication protocol designed for use on insecure networks (the Internet for example). It allows individuals communicating over a network to prove their identity to each other while also preventing eavesdropping or replay attacks, and provides for detection of modification and the prevention of unauthorized reading. This can be proven using BAN logic.The protocol was first described under the name "The Wide-mouthed-frog Protocol" in the paper "A Logic of Authentication" (1990), which introduced Burrows–Abadi–Needham logic, and in which it was an "unpublished protocol ... proposed by" coauthor Michael Burrows. The paper gives no rationale for the protocol's whimsical name.The protocol can be specified as follows in security protocol notation: A, B, and S are identities of Alice, Bob, and the trusted server respectively and are timestamps generated by A and S respectively is a symmetric key known only to A and S is a generated symmetric key, which will be the session key of the session between A and B is a symmetric key known only to B and S Note that to prevent active attacks, some form of authenticated encryption (or message authentication) must be used.The protocol has several problems: a global clock is required. the server S has access to all keys. the value of the session key is completely determined by A, who must be competent enough to generate good keys. can replay messages within period when timestamp is valid. A is not assured that B exists. The protocol is stateful. This is usually undesired because it requires more functionality and capability from the server. For example, S must be able to deal with situations in which B is unavailable.↑ 1.0 1.1 ↑ 2.0 2.1 ↑".
- Wide_Mouth_Frog_protocol wikiPageID "433034".
- Wide_Mouth_Frog_protocol wikiPageRevisionID "562053093".
- Wide_Mouth_Frog_protocol hasPhotoCollection Wide_Mouth_Frog_protocol.
- Wide_Mouth_Frog_protocol subject Category:Computer_access_control_protocols.
- Wide_Mouth_Frog_protocol type Abstraction100002137.
- Wide_Mouth_Frog_protocol type Communication100033020.
- Wide_Mouth_Frog_protocol type ComputerAccessControlProtocols.
- Wide_Mouth_Frog_protocol type Direction106786629.
- Wide_Mouth_Frog_protocol type Message106598915.
- Wide_Mouth_Frog_protocol type Protocol106665108.
- Wide_Mouth_Frog_protocol type Rule106652242.
- Wide_Mouth_Frog_protocol comment "The Wide-Mouth Frog protocol is a computer network authentication protocol designed for use on insecure networks (the Internet for example). It allows individuals communicating over a network to prove their identity to each other while also preventing eavesdropping or replay attacks, and provides for detection of modification and the prevention of unauthorized reading.".
- Wide_Mouth_Frog_protocol label "Protokół Wide-Mouth Frog".
- Wide_Mouth_Frog_protocol label "Wide Mouth Frog protocol".
- Wide_Mouth_Frog_protocol label "Wide-Mouth Frog".
- Wide_Mouth_Frog_protocol sameAs Protokół_Wide-Mouth_Frog.
- Wide_Mouth_Frog_protocol sameAs m.027xgr.
- Wide_Mouth_Frog_protocol sameAs Q4053131.
- Wide_Mouth_Frog_protocol sameAs Q4053131.
- Wide_Mouth_Frog_protocol sameAs Wide_Mouth_Frog_protocol.
- Wide_Mouth_Frog_protocol wasDerivedFrom Wide_Mouth_Frog_protocol?oldid=562053093.
- Wide_Mouth_Frog_protocol isPrimaryTopicOf Wide_Mouth_Frog_protocol.