Adversary. The adversary is neither a client, nor the server, and in our formalization it is given enormous capabilities to closely model its abilities in the real life: the adversary can tap on the wire to eavesdrop, delete, delay, insert, replay, modify messages. We model these capabilities through the following queries: A ⊥ A A
Appears in 1 contract
Sources: Mutual Authentication and Group Key Agreement for Low Power Mobile Devices
Adversary. The adversary is neither a client, nor the server, and in our formalization it is given enormous capabilities to closely model its abilities in the real life: the adversary can tap on the wire to eavesdrop, delete, delay, insert, replay, modify messages. We model these capabilities through the following queries: A ⊥ A AA J
Appears in 1 contract
Sources: Mutual Authentication and Group Key Agreement for Low Power Mobile Devices