Identity-based anonymous remote authentication scheme for GLOMONETS

Authentication protocols are an extremely important aspect of a secure network connection. In essence, authentication protocols serve as the first layer of defence against malicious attacks by authenticating different groups of entities that wish to communicate with each other securely. The study an...

Full description

Saved in:
Bibliographic Details
Main Author: Goh, Yong Rui.
Other Authors: Ma Maode
Format: Final Year Project
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10356/54458
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Be the first to leave a comment!
You must be logged in first