Authentication: From Passwords to Public Keys

Front Cover
Addison-Wesley, 2002 - Computers - 549 pages
0 Reviews
This volume examines techniques for contemporary authentication methods for computer access control and security passwords, and also looks at how to choose the best authentication method for any given situation. It starts with a simple case study of a single workstation, and works its way up to more elaborate situations involving networks and remote access.

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.


Chapter 2
Chapter 3
Chapter 5

14 other sections not shown

Other editions - View all

Common terms and phrases

References to this book

All Book Search results »

About the author (2002)

Richard E. Smith works for Secure Computing Corporation where he provides consulting services in network security to commercial and government organizations, including the National Security Agency. He has also served as principal systems engineer for military network guard systems and the Sidewinder Internet Firewall. He frequently lectures, writes, and conducts seminars on cryptography and computer security. He holds an M.S. and Ph.D. in computer science from the University of Minnesota and a B.S. in engineering from Boston University.


Bibliographic information