Remote User Authentication Using Symmetric Encryption
Mutual Authentication A two-level hierarchy of symmetric encryption keys can be used to provide confidentiality for communication in a distributed environment. In general, this strategy involves the use of a […]
Read More