Identity-based anonymous remote authentication scheme for GLOMONETS
Authentication protocols are an extremely important aspect of a secure network connection. In essence, authentication protocols serve as the first layer of defence against malicious attacks by authenticating different groups of entities that wish to communicate with each other securely. The study an...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/54458 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |