Research Output
Security and forensic computing: authentication.
  4 AUTHENTICATION, HASHING AND DIGITAL CERTIFICATES 130
4.1 Introduction 130
4.2 Methods of authentication 132
4.3 Biometrics 134
4.4 Message hash 136
4.5 Authenticating the sender 140
4.6 Digital certificates and PKI 143
4.7 HMAC (Hash Message Authentication Code) 150
4.8 Future of Authentication Systems - Kerberos 152
4.9 Email encryption 156
4.10 Tutorial 157
4.11 Software Tutorial 158
4.12 On-line Exercises 161
4.13 Web Page Exercises 161
4.14 NetworkSims exercises 162
4.15 Chapter Lecture 162
4.16 Reference 162

  • Date:

    30 November 2010

  • Publication Status:

    Published

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Buchanan, W. J. (2010). Security and forensic computing: authentication

Authors

Keywords

Authentication; biometrics; digital certificates; encryption; hash signature; data security;

Monthly Views:

Available Documents