Advertisement

Case Study: A Secure Networked Application

  • Keir Davis
  • John W. Turner
  • Nathan Yocom

Abstract

An examination of all the concepts in this section is best supported by a single example that uses those concepts in a real-world context. Let’s look at a networked application that requires the utmost security: an authentication server.

Keywords

Common Code Server Code Incoming Connection Unsigned Integer Client Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Keir Davis, John W. Turner, Nathan Yocom 2004

Authors and Affiliations

  • Keir Davis
  • John W. Turner
  • Nathan Yocom

There are no affiliations available

Personalised recommendations