SLIDE 1
Lecture 6 Page 1 CS 236 Online
Timestamps in Security Protocols
- One method of handling this kind of
problem is timestamps
- Proper use of timestamps can limit the
time during which an exposed key is dangerous
- But timestamps have their own