Skip to main content

Authentication

  • Reference work entry
  • First Online:
Book cover Encyclopedia of Database Systems
  • 34 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Bishop M. Computer security: art and science. Boston: Addison Wesley Professional; 2002.

    Google Scholar 

  2. Haller N. The S/Key one-time password system. In: Proceedings of the Network and Distributed Systems Security Symposium; 1994. p. 151–7.

    Google Scholar 

  3. Menezes A, van Oorschot P, Vanstone S. Handbook of applied cryptography. Boca Raton: CRC; 1996.

    Book  MATH  Google Scholar 

  4. Pfleeger C, Pfleeger S. Security in computing. 3rd ed. Englewood Cliffs: Prentice-Hall; 2003.

    MATH  Google Scholar 

  5. Schneier B. Applied cryptography: protocols, algorithms, and source code in C. 2nd ed. New York: Wiley; 1996.

    MATH  Google Scholar 

  6. Stallings W. Cryptography and network security: principles and practices. 4th ed. New Delhi: Pearson Prentice Hall; 2006.

    Google Scholar 

  7. Stinson D. Cryptography: theory and practice. 3rd ed. Boca Raton: Chapman & Hall/CRC; 2006.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marina Blanton .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Blanton, M. (2018). Authentication. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_32

Download citation

Publish with us

Policies and ethics