Abstract
Authentication has become a major issue for any application developer who expects code to run across a network or across the Internet. Making sure that users are who they say they are and verifying machine identities on demand are part of an application’s security module. Developers of Windows applications should conform to the Windows-specific security procedures implemented by Microsoft, in addition to any additional security measures to be imposed by the application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2004 Christian Nagel, Ajit Mungale, Vinod Kumar, Nauman Laghari, Andrew Krowczyk, Tim Parker, Srinivasa Sivakumar, and Alexandru Serban
About this chapter
Cite this chapter
Nagel, C. et al. (2004). Authentication Protocols. In: Pro .NET 1.1 Network Programming. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0660-6_13
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0660-6_13
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-59059-345-5
Online ISBN: 978-1-4302-0660-6
eBook Packages: Springer Book Archive