Phil Janson

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Disclaimer: Some of systems mentioned in this book may be protected by trademarks, copyrights, or patents. They are the property of their owners. Foreword Some years ago, businesses could choose whether to migrate to electronic commerce, however, today it seems they have no choice. Predictions indicate that companies that do not make the necessary changes(More)
In this paper, a number of mechanisms are described that can be used in the design of a protocol convertor for authentication and key distribution protocols. First, the scope of the mechanisms is deened: we mark out the class of authentication systems that were considered during the design of the mechanisms. A rst mechanism, based on proxies and a(More)
  • 1