Suggested Topics within your search.
Showing 1 - 2 results of 2 for search 'Challenge–response authentication', query time: 0.04s Refine Results
  1. 1
    by Lee, Ruby B.
    Published 2013
    Table of Contents: ...6. Security protocols -- 6.1 Protocol notation -- 6.2 Challenge-response protocols -- 6.3 Protocol...
    Abstract with links to full text
    eBook
  2. 2
    by Lee, Ruby B.
    Published 2013
    Table of Contents: ...6. Security protocols -- 6.1 Protocol notation -- 6.2 Challenge-response protocols -- 6.3 Protocol...
    Abstract with links to full text
    eBook