We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are(More)
  • 1