Peer-to-peer security authentication protocol

作者: Steven Neil Simon

DOI:

关键词: AuthorizationSecurity authenticationNode (networking)Peer-to-peerProtocol (object-oriented programming)Computer networkEncryptionComputer securitySalt (cryptography)Service (business)Computer science

摘要: A salt transmitted by a second node is received at first node. The used to decrypt encrypted data. Optionally, authorization access service provided the In some cases includes one or more files.

参考文章(25)
Scott M. Volmar, Martin B. Bushman, John D. R. Spain, Richard A. Lee, Iv John D. R. Spain, System and method for user identification and authentication ,(2006)
Nathan Edward Tenny, Signaling with opaque ue identities ,(2007)
John Michael Walker, Avelina Pardo-Blazquez, Miguel-Angel Monjas-Llorente, Miguel Carretero-Gomez, Gregorio-Rodriguez Jesus-Angel De, Means and method for generating a unique user's identity for use between different domains ,(2003)
Alec Muffett, Casper H. Dik, Darren J. Moffat, Method and apparatus for implementing a pluggable password obscuring mechanism ,(2003)
Ilya G. Minkin, Igor V. Balabine, William G. Friedman, Establishing authenticated network connections ,(2002)