Downloads & Free Reading Options - Results

Entity Authentication Using Public Key Cryptography by National Institute Of Standards And Technology (u.s.)

Read "Entity Authentication Using Public Key Cryptography" by National Institute Of Standards And Technology (u.s.) through these free online access and download options.

Search for Downloads

Search by Title or Author

Books Results

Source: The Internet Archive

The internet Archive Search Results

Available books for downloads and borrow from The internet Archive

1DTIC ADA408513: Entity Authentication Using Public Key Cryptography

By

This standard specifies two challenge-response protocols by which entities in a computer system may authenticate their identities to one another. These may be used during session initiation, and at any other time that entity authentication is necessary. Depending on which protocol is implemented, either one or both entities involved may be authenticated. The defined protocols are derived from an international standard for entity authentication based on public key cryptography, which uses digital signatures and random number challenges.

“DTIC ADA408513: Entity Authentication Using Public Key Cryptography” Metadata:

  • Title: ➤  DTIC ADA408513: Entity Authentication Using Public Key Cryptography
  • Author: ➤  
  • Language: English

“DTIC ADA408513: Entity Authentication Using Public Key Cryptography” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 29.38 Mbs, the file-s for this book were downloaded 78 times, the file-s went public at Thu May 10 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA408513: Entity Authentication Using Public Key Cryptography at online marketplaces:


Buy “Entity Authentication Using Public Key Cryptography” online:

Shop for “Entity Authentication Using Public Key Cryptography” on popular online marketplaces.