Heuristic authentication protocol for TCP/IP network applications under UNIX.
A. H. WadaaHussein M. Abdel-WahabJohn McHughPublished in: ACM Southeast Regional Conference (1992)
Keyphrases
- ip networks
- authentication protocol
- smart card
- tcp ip
- network management
- ip traffic
- communication networks
- security analysis
- quality of service
- lightweight
- network security
- mobile networks
- public key
- internet protocol
- rfid tags
- secret key
- network design
- security protocols
- network resources
- hash functions
- mobile devices
- video sequences
- information security
- low cost