Authentication Systems for Secure Networks

Product Description
This unique book explores the use of cryptographic techniques in authentication and key distribution systems. Systems such as Kerberos, NetSP, SPX, TESS, and SESAME are analyzed and compared. Computer scientists, electrical engineers, networking specialists, and information technology professionals learn valuable cryptographic techniques–and why authentication and key distribution systems are likely to become the primary means for securing networks and distributed … More >>

Authentication Systems for Secure Networks

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.