Autentifikacijos protokolų tyrimas

In this paper I examine the possibilities of subject authentification, cryptographic methods of authentification in symmetrical and asymmetrical criptology systems (for instance, on-line and off-line regimes authentification; authentification with the participation of a two servers or an arbiter, et...

Full description

Bibliographic Details
Main Author: Maklakova, Natalija
Other Authors: Dzemyda, Gintautas
Format: Dissertation
Language:Lithuanian
Published: Lithuanian Academic Libraries Network (LABT) 2006
Subjects:
Online Access:http://vddb.library.lt/fedora/get/LT-eLABa-0001:E.02~2006~D_20060626_221538-47003/DS.005.0.01.ETD