distributedsystems-cityuniversitylondon.pptVIP

  • 1
  • 0
  • 约5.02万字
  • 约 40页
  • 2017-03-08 发布于天津
  • 举报
distributedsystems-cityuniversitylondon

We are now going to look at techniques for authentication. Authentication is concerned with proving that a subject is who it claims to be. Hence, authentication is concerned with preventing masquerading. We will see that authentication deploys the techniques we have got to know in the previous part on cryptography, as public or secret keys are used to secure the transmission of authentication information We are first going to look at different types of authentication and then at different types of authentication. A particular technique that components can use to authenticate themselves is the

文档评论(0)

1亿VIP精品文档

相关文档