- 1
- 0
- 约5.02万字
- 约 40页
- 2017-03-08 发布于天津
- 举报
distributedsystems-cityuniversitylondon
We are now going to look at techniques for authentication. Authentication is concerned with proving that a subject is who it claims to be. Hence, authentication is concerned with preventing masquerading. We will see that authentication deploys the techniques we have got to know in the previous part on cryptography, as public or secret keys are used to secure the transmission of authentication information We are first going to look at different types of authentication and then at different types of authentication. A particular technique that components can use to authenticate themselves is the
您可能关注的文档
- computersecurityintherealworld-microsoftresearch.ppt
- comunicato-serie-c2.doc-comitatoregionalelombardo.doc
- component3-glowblogs.doc
- conoceryutilizarherramientasdesoftwarelibreque-assembla.doc
- confiraaquiapalestra.ppt
- conferenzadirittodell'ambienteslidesdavid-elsagenova.ppt
- consultantrosterinformationform-washingtonstateparks.doc
- contractualteachersession2016-17.-kendriyavidyalayano2.doc
- contd..-incometaxe-filing.ppt
- constructiontypeofbuildings.ppt
- doc-altio.us.doc
- doc-dcsoftwaredesign,inc.doc
- doc-williansmartins.docx
- doc-departmentofengineeringdesign-indianinstituteof.doc
- docspecsection034000forprecastconcrete,english,75kb-hilti.doc
- districtirrigationplan.ppt
- descargalalistadematerialesaquíen.doc-dronesbaratos.doc
- documentcenterpublicwgjava-hl7.ppt
- download-kingspaninsulation.doc
- doc-mattsmith.doc
原创力文档

文档评论(0)