Observed weaknesses in security dynamics' client/server protocol.
Adam ShostackPublished in: Network Threats (1996)
Keyphrases
- client server
- cryptographic protocols
- client server architecture
- security protocols
- data integrity
- authentication protocol
- key agreement protocol
- distributed databases
- distributed multimedia
- mobile agents
- database server
- database architectures
- visual basic
- peer to peer
- lightweight
- security requirements
- database
- distributed object
- response time
- client server databases