CONSTRUCTION OF EFFICIENT AUTHENTICATION SCHEMES USING TRAPDOOR HASH FUNCTIONS

In large-scale distributed systems, where adversarial attacks can have widespread impact, authentication provides protection from threats involving impersonation of entities and tampering of data. Practical solutions to authentication problems in distributed systems must meet specific constraints of...

Full description

Bibliographic Details
Main Author: Chandrasekhar, Santosh
Format: Others
Published: UKnowledge 2011
Subjects:
Online Access:http://uknowledge.uky.edu/gradschool_diss/162
http://uknowledge.uky.edu/cgi/viewcontent.cgi?article=1174&context=gradschool_diss