Authentication

This lecture will address Authentication mechanisms and protocols

Download here

  • Security in Computing, 4th edition, C. P. Pfleeger, S. L. Pfleeger: Sec. 4.5
  • Segurança em Redes Informáticas, A. Zúquete: Secs. 5.3, 5.4.1, 8.6.3, 8.9.2, Chap. 10, Sec. 11.3
Previous
Next