Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Bishop M. Computer security: art and science. Boston: Addison Wesley Professional; 2002.
Haller N. The S/Key one-time password system. In: Proceedings of the Network and Distributed Systems Security Symposium; 1994. p. 151–7.
Menezes A, van Oorschot P, Vanstone S. Handbook of applied cryptography. Boca Raton: CRC; 1996.
Pfleeger C, Pfleeger S. Security in computing. 3rd ed. Englewood Cliffs: Prentice-Hall; 2003.
Schneier B. Applied cryptography: protocols, algorithms, and source code in C. 2nd ed. New York: Wiley; 1996.
Stallings W. Cryptography and network security: principles and practices. 4th ed. New Delhi: Pearson Prentice Hall; 2006.
Stinson D. Cryptography: theory and practice. 3rd ed. Boca Raton: Chapman & Hall/CRC; 2006.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media, LLC, part of Springer Nature
About this entry
Cite this entry
Blanton, M. (2018). Authentication. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_32
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8265-9_32
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8266-6
Online ISBN: 978-1-4614-8265-9
eBook Packages: Computer ScienceReference Module Computer Science and Engineering