Skip to main content

Authentication Protocols

  • Chapter
  • First Online:
Pro .NET 1.1 Network Programming

Abstract

Authentication has become a major issue for any application developer who expects code to run across a network or across the Internet. Making sure that users are who they say they are and verifying machine identities on demand are part of an application’s security module. Developers of Windows applications should conform to the Windows-specific security procedures implemented by Microsoft, in addition to any additional security measures to be imposed by the application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Christian Nagel, Ajit Mungale, Vinod Kumar, Nauman Laghari, Andrew Krowczyk, Tim Parker, Srinivasa Sivakumar, and Alexandru Serban

About this chapter

Cite this chapter

Nagel, C. et al. (2004). Authentication Protocols. In: Pro .NET 1.1 Network Programming. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0660-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-1-4302-0660-6_13

  • Published:

  • Publisher Name: Apress, Berkeley, CA

  • Print ISBN: 978-1-59059-345-5

  • Online ISBN: 978-1-4302-0660-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics