Impersonation Attack
Key Facts
Abbreviation
IA
Pronunciation
/ˌɪmpərsəˈneɪʃən əˈtæk/
Category
Computing
Related Field
Cyber & Security
Examples in Context
- This scheme bearing the following characteristics : it provides mutual authentication between the user and server which can resist the impersonation attack;
- It allows authorization data to be shared among virtual domains without the possibility of the impersonation attack.
- In this paper, author makes use of symplectic geometry over finite field to construct Cartesian authentication code, presents a method of its construction, and at the same time, computes its size parameters and successful probability of impersonation attack and substitution attack.
- Two constructions of Cartesian authentication codes from orthogonal geometry over finite field with characteristic 2 are given in this paper. Their size parameters and their probabilities of successful impersonation attack and of successful substitution attack are also computed.
- In the present paper, two new constructions of Cartesian authentication codes from pseudo symplectic geometry are presented and their size parameters and their probabilities of successful impersonation attack and of successful substitution attack are computed.
Other meanings of IA
Industrial Attachment
Business
Intelligent Automata
Computing
Instant Access
Computing
Information Appliance
Computing
Intel AMD (computer architecture)
Computing
Inflow Area
Gov
Insane Assassin
Gov
Instant Action
Gov
Impulse Activity
Medical
Innovative Audio
Community