Autentifikacijos protokolų tyrimas
In this paper I examine the possibilities of subject authentification, cryptographic methods of authentification in symmetrical and asymmetrical criptology systems (for instance, on-line and off-line regimes authentification; authentification with the participation of a two servers or an arbiter, et...
Main Author: | |
---|---|
Other Authors: | |
Format: | Dissertation |
Language: | Lithuanian |
Published: |
Lithuanian Academic Libraries Network (LABT)
2006
|
Subjects: | |
Online Access: | http://vddb.library.lt/fedora/get/LT-eLABa-0001:E.02~2006~D_20060626_221538-47003/DS.005.0.01.ETD |