Access Restriction

Author Cavaiani, Charles ♦ Alves-Foss, Jim
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract The explosive growth of networked and internetworked computer systems during the past decade has brought about a need for increased protection mechanisms. This paper discusses three authentication protocols that incorporate the use of methods that present effective user authentication. The first two protocols have been previously discussed in the literature; the third protocol draws from the first two and others to produce an authentication scheme that provides both mutual authentication and secure key distribution which is easy to use, is compatible with present operating systems, is transparent across systems, and provides password file protection.
Description Affiliation: Univ. of Idaho, Moscow (Alves-Foss, Jim)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2003-03-01
Publisher Place New York
Journal Crossroads (CROS)
Volume Number 2
Issue Number 4
Page Count 6
Starting Page 17
Ending Page 22

Open content in new tab

   Open content in new tab
Source: ACM Digital Library