CONSTRUCTION OF EFFICIENT AUTHENTICATION SCHEMES USING TRAPDOOR HASH FUNCTIONS
In large-scale distributed systems, where adversarial attacks can have widespread impact, authentication provides protection from threats involving impersonation of entities and tampering of data. Practical solutions to authentication problems in distributed systems must meet specific constraints of...
Main Author: | |
---|---|
Format: | Others |
Published: |
UKnowledge
2011
|
Subjects: | |
Online Access: | http://uknowledge.uky.edu/gradschool_diss/162 http://uknowledge.uky.edu/cgi/viewcontent.cgi?article=1174&context=gradschool_diss |