Lecture Data security and encryption - Chapter 22: User authentication
Lecture Data security and encryption - Chapter 22: User authentication
The contents of this chapter include all of the following: Remote user authentication issues, authentication using symmetric encryption, the Kerberos trusted key server system, authentication using asymmetric encryption, federated identity management.