Abstract
An authentication mechanism aims primarily at enabling a receiver and, if applicable, further observers of a message to verify whether that message originates from the claimed sender and has not been substituted or modified since being sent. Thus, while messages might be generated and transmitted or stored in an environment that potentially facilitates manipulations against the interests of integrity, authenticity and non-repudiation, the receivers and possibly further participants have means to detect such manipulations.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
(2009). Authentication. In: Security in Computing Systems. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78442-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-78442-5_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78441-8
Online ISBN: 978-3-540-78442-5
eBook Packages: Computer ScienceComputer Science (R0)