CHAPTER 16
User Authentication
16.1 Remote User-Authentication Principles
The NIST Model for Electronic User Authentication
16.2 Remote User-Authentication Using Symmetric Encryption
16.4 Remote User-Authentication Using Asymmetric Encryption
16.5 Federated Identity Management
LEARNING OBJECTIVES
After studying this chapter, you should be able to:
- ◆ Present an overview of techniques for remote user authentication using symmetric encryption. ...
Get Cryptography and Network Security Principles and Practice, 8th Edition - Pearson now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.