Search -
Authentication: From Passwords to Public Keys
Authentication From Passwords to Public Keys Author:Richard E. Smith Gives readers a clear understanding of what an organization needs to reliably identify its users and how the different techniques for verifying identity are executed. Softcover.