正在加载图片...
Authentication Peer Entity Authentication -in a connection based environment: provide confidence in the identity of a connecting entity Logging in with a password Gaining access via biological identity verification DNA identification, retinal scan, finger/hand print identification Access via audio voice identification Data Origin authentication -in a connectionless environment; provide assurance that the source of received data is as claimed Corroborates the source of the data Does not proved assurance against duplicate or modified data11 Authentication • Peer Entity Authentication – in a connection based environment; provide confidence in the identity of a connecting entity – Logging in with a password – Gaining access via biological identity verification • DNA identification, retinal scan, finger/hand print identification – Access via audio voice identification • Data Origin Authentication – in a connectionless environment; provide assurance that the source of received data is as claimed – Corroborates the source of the data – Does not proved assurance against duplicate or modified data
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有