Advertisement

Authentication Protocols

  • Christian Nagel
  • Ajit Mungale
  • Vinod Kumar
  • Nauman Laghari
  • Andrew Krowczyk
  • Tim Parker
  • S. Srinivasa Sivakumar
  • Alexandru Serban

Abstract

Authentication has become a major issue for any application developer who expects code to run across a network or across the Internet. Making sure that users are who they say they are and verifying machine identities on demand are part of an application’s security module. Developers of Windows applications should conform to the Windows-specific security procedures implemented by Microsoft, in addition to any additional security measures to be imposed by the application.

Keywords

Authentication Protocol Authentication System Security Package Data Encryption Standard Security Context 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Christian Nagel, Ajit Mungale, Vinod Kumar, Nauman Laghari, Andrew Krowczyk, Tim Parker, Srinivasa Sivakumar, and Alexandru Serban 2004

Authors and Affiliations

  • Christian Nagel
  • Ajit Mungale
  • Vinod Kumar
  • Nauman Laghari
  • Andrew Krowczyk
  • Tim Parker
  • S. Srinivasa Sivakumar
  • Alexandru Serban

There are no affiliations available

Personalised recommendations