Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
4 AUTHENTICATION, HASHING AND DIGITAL CERTIFICATES 130
4.1 Introduction 130
4.2 Methods of authentication 132
4.3 Biometrics 134
4.4 Message hash 136
4.5 Authenticating the sender 140
4.6 Digital certificates and PKI 143
4.7 HMAC (Hash Message Authentication Code) 150
4.8 Future of Authentication Systems - Kerberos 152
4.9 Email encryption 156
4.10 Tutorial 157
4.11 Software Tutorial 158
4.12 On-line Exercises 161
4.13 Web Page Exercises 161
4.14 NetworkSims exercises 162
4.15 Chapter Lecture 162
4.16 Reference 162
Buchanan, W. J. (2011). Security and forensic computing: authentication
Publication Date | 2011 |
---|---|
Deposit Date | Jan 11, 2011 |
Publicly Available Date | Dec 31, 2011 |
Peer Reviewed | Not Peer Reviewed |
Keywords | Authentication; biometrics; digital certificates; encryption; hash signature; data security; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/4060 |
Contract Date | Jan 11, 2011 |
unit05_authentication.pdf
(10.1 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
sfc_unit04.html
(516 bytes)
Other
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
An omnidirectional approach to touch-based continuous authentication
(2023)
Journal Article
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search