作者: Graeme D. Baer , Gregory B. Roth
DOI:
关键词: Lightweight Extensible Authentication Protocol 、 Distributed computing 、 Authentication protocol 、 Computer science 、 Data Authentication Algorithm 、 Credential 、 Access to information 、 Computer access control 、 Computer security 、 Authentication 、 Password
摘要: A credential, such as a password, for an entity is used to generate multiple keys. The generated keys are distributed credential verification systems enable the perform authentication operations. that access key allows with proper subset of systems. Thus, unauthorized information by one system does not, itself, allow successful other