|
The advent of the Internet has allowed for many services and applications, most
notably in communications between users, servers, and devices. Unfortunately,
this has led to many security challenges and problems. Recent examples include
password leakage on large social network sites and defacement of websites. It is,
therefore, necessary to study mechanisms that help reduce the risks of different types
of attacks. One of those mechanisms is access control, which applies the processes of
cryptography, authentication, and key establishment. Thus, this book is written with
an attempt to provide a comprehensive coverage on the subject of authentication
mechanisms. The book is intended for anyone wishing to understand the basic
principles of cryptography and why they form an important part of authentication
mechanisms. In addition, it provides readers with theories and examples of existing
authentication technologies, which the author hopes will be useful and adaptable in
practice. However, this book is not a manual for network or system configurations.
Authentication and Access Control: Practical Cryptography Methods and Tools can
be used in many ways. It can be used as a self-study reference. It can also be used as
a supplementary textbook for computer network security and information security
courses. |