Login / Signup
Analysis of security protocols for authentication in distributed systems.
H. A. Eneh
Orhan Gemikonakli
Published in:
IADIS AC (2005)
Keyphrases
</>
distributed systems
load balancing
security protocols
geographically distributed
mobile agents
distributed environment
authentication protocol
software architecture
fault tolerance
information systems
operating system
automated design