This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
9.7 References
Pipkin, Donald, L. Information Security: Protecting the Global Enterprise. Upper Saddle River, NJ: Prentice Hall, 2000.
“The Rainbow Books,” National Computer Security Center, http://www.fas.org/irp/nsa/rainbow/tg017.htm
Marshall, Bruce. “Consider Your Options for Authentication”. http://www.ins.com/downloads/publications/bMarshall_issa_password_article_062002.pdf
“Cryptography Research Group —-Projects.” http://www.research.ibm.com/security/projects.html
“Glossary of terms.” http://www.asuretee.com/developers/authentication-terms.shtm
“Digital Signature Authentication.” http://www.cequrux.com/support/firewall/node29.htm
Kaeo, Merike. Designing Network Security: A Practical Guide to Creating a Secure Network Infrastructure. Indianapolis: Cisco Press, 1999.
“Certificate Authentication.” http://www.ssh.com/support/documentation/online/ssh/adminguide/32/Certificate_Authentication-2.html
“Configuring SSL Authentication.” Oracle Advance Security Administrator's Guide Release 8.1.5. A677-01 http://www.csee.umbc.edu/help/oracle8/network.815/a67766/09_ssl.htm
Barkley, John. “Robust Authentication Procedures.”. http://csrc.nist.gov/publications/nistpubs/800-7/nodel66.html
“General Information on Kerberos.” http://www.cmf.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html#tgttgs
Brian Tung. “The Moron's Guide to Kerberos.”. http://www.isi.edu/~brian/security/kerberos.html.
“AIX Version 4.3 Communications Programming Concepts: RPC Authentications.” http://www.nscp.upenn.edu/aix4.3html/aixprggd/progcomc/rpc_auth.htm.
Paul Brooke. “Setting The Stage For Authentication” Network Computing.” http://www.networkcomputing.com/1211/1211ws22.html).
Holden, Greg. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. Boston, MA: Thomason Learning, 2004.
Galbraith, Steven, and Wenbo Mao. “Invisibility and Anonymity of Undeniable and Confirmer Signatures.” http://www-uk.hpl.hp.com/people/wm/papers/InAnRSA.pdf
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). Authentication. In: Computer Network Security. Springer, Boston, MA. https://doi.org/10.1007/0-387-25228-2_9
Download citation
DOI: https://doi.org/10.1007/0-387-25228-2_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-20473-4
Online ISBN: 978-0-387-25228-5
eBook Packages: Computer ScienceComputer Science (R0)