Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Intruder

Handbook of Research on Information Security and Assurance
The term intruder is used to refer to an entity that interacts with or takes part in a protocol with intent to undermine the goals of the protocol. Also known as an enemy, attacker, spy, eavesdropper, penetrator, opponent, or an insider.
Published in Chapter:
Formal Analysis and Design of Authentication Protocols
Siraj Ahmed Shaikh (United Nations University (UNU), Macau, SAR China)
Copyright: © 2009 |Pages: 14
DOI: 10.4018/978-1-59904-855-0.ch020
Abstract
The purpose of this chapter is to introduce the reader to the research area of formal analysis of authentication protocols. It briefly introduces the basic notions of cryptography and its use in authentication protocols. The chapter looks at the Needham-Schroeder (1978) protocol as an example of an authentication protocol, and examines the history of the protocol as a stimulus to the formal analysis of such protocols. We then introduce the process algebra CSP (Hoare, 1985) to model authentication protocols and present Schneider’s (1998) rank function approach to analysing such protocols. The chapter concludes by describing related ongoing work in this area of research and highlight some of the challenges posed by the problem of analysing and designing protocols.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Hardware Approach for Trusted Access and Usage Control
a person with no database privilege, who infiltrates a computer system and tries to extract valuable information from the database footprint on disk.
Full Text Chapter Download: US $37.50 Add to Cart
Real Time Internal Intrusion Detection: A Case Study of Embedded Sensors and Detectors in E-Government Websites
A person who is the perpetrator of a computer security incident often referred to as hackers or crackers.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR