Identity-based anonymous remote authentication scheme for GLOMONETS

Authentication protocols are an extremely important aspect of a secure network connection. In essence, authentication protocols serve as the first layer of defence against malicious attacks by authenticating different groups of entities that wish to communicate with each other securely. The study an...

Full description

Bibliographic Details
Main Author: Goh, Yong Rui.
Other Authors: Ma Maode
Format: Final Year Project (FYP)
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10356/54458