Lecture Data security and encryption - Lecture 22: User Authentication
Lecture Data security and encryption - Lecture 22: User Authentication
The contents of this chapter include all of the following: Remote user authentication issues, authentication using symmetric encryption, the Kerberos trusted key server system, authentication using asymmetric encryption, federated identity management.