C. Fritzner

Learn More
The paper shows how Security Iqformatwn for user au-lhenticatwn, peer-entity authentication and access control is created and w " lised in large distributed systems. The protectwn mechanisms used are hashfwctions, symmetric and asymmetric cryptography. We describeand combine data formats for Secura " ty Injormatwn based on international standardsfrom(More)
  • 1