Joyita Sikder

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Network authentication, even when using libraries intended to simplify the task, is inordinately difficult. Separate libraries are used for cryptography, network authen-tication protocols, accessing stored authentication information , and verifying the identity of remote entities. In addition, service used must be authorized. Finally, privilege separation(More)
  • 1