Abstract
In this Chapter the issues concerning user/entity authentication and the problem of key management are discussed in depth. In Section 1.2.1 the user/data authentication paradigm was introduced. In order to be able to enforce any security scheme it is necessary that every entity in the network is always convinced of the identity of the other parties it is communicating with.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Ashley, P., Vandenwauver, M. (1999). Authentication and Key Management. In: Practical Intranet Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-5609-1_2
Download citation
DOI: https://doi.org/10.1007/978-1-4615-5609-1_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-7566-1
Online ISBN: 978-1-4615-5609-1
eBook Packages: Springer Book Archive