作者: Fenglin Yin
DOI:
关键词: Hash function 、 Hash chain 、 Computer security 、 Key (cryptography) 、 Session ID 、 Computer network 、 Session (computer science) 、 User device 、 Computer science 、 Identifier
摘要: A first device may receive a session token from second device; determine that the is expired or invalid; provide security input to cause generate hash value of using key corresponding identifier (ID); ID and ID; matches value; establish with based on determining value.