Table of Contents
Lecture 03 - Authentication and Key Establishment
More resources
Lecture 03 - Authentication and Key Establishment
Lecture 03 - Authentication and Key Establishment
More resources
Computer Security and the Internet: Tools and Jewels
⇒
Chapter 3 (User Authentication, pdf)
+
Chapter 4 (Key Establishment, pdf)