Identity-based anonymous remote authentication scheme for GLOMONETS

Authentication protocols are an extremely important aspect of a secure network connection. In essence, authentication protocols serve as the first layer of defence against malicious attacks by authenticating different groups of entities that wish to communicate with each other securely. The study an...

全面介紹

Saved in:
書目詳細資料
主要作者: Goh, Yong Rui.
其他作者: Ma Maode
格式: Final Year Project
語言:English
出版: 2013
主題:
在線閱讀:http://hdl.handle.net/10356/54458
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!