Skip to main content

Research Repository

Advanced Search

Security and forensic computing: authentication.

Buchanan, William J

Authors



Abstract

4 AUTHENTICATION, HASHING AND DIGITAL CERTIFICATES 130
4.1 Introduction 130
4.2 Methods of authentication 132
4.3 Biometrics 134
4.4 Message hash 136
4.5 Authenticating the sender 140
4.6 Digital certificates and PKI 143
4.7 HMAC (Hash Message Authentication Code) 150
4.8 Future of Authentication Systems - Kerberos 152
4.9 Email encryption 156
4.10 Tutorial 157
4.11 Software Tutorial 158
4.12 On-line Exercises 161
4.13 Web Page Exercises 161
4.14 NetworkSims exercises 162
4.15 Chapter Lecture 162
4.16 Reference 162

Citation

Buchanan, W. J. (2011). Security and forensic computing: authentication

Publication Date 2011
Deposit Date Jan 11, 2011
Publicly Available Date Dec 31, 2011
Peer Reviewed Not Peer Reviewed
Keywords Authentication; biometrics; digital certificates; encryption; hash signature; data security;
Public URL http://researchrepository.napier.ac.uk/id/eprint/4060

Files






You might also like



Downloadable Citations