Suppose that A wants t o send a message M to B. It is important that B receives the message without any alteration. On the other hand, a bad guy X looks for his chance to alter M in his favour. In order t o make the bad guy’s life difficult, A authenticates the message M.
CITATION STYLE
Beutelspacher, A. (1988). Perfect and essentially perfect authentication schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 304 LNCS, pp. 167–170). Springer Verlag. https://doi.org/10.1007/3-540-39118-5_16
Mendeley helps you to discover research relevant for your work.