tailieunhanh - Lecture Data security and encryption - Chapter 22: User authentication

The contents of this chapter include all of the following: Remote user authentication issues, authentication using symmetric encryption, the Kerberos trusted key server system, authentication using asymmetric encryption, federated identity management. |