作者: Mark Buer
DOI:
关键词:
摘要: In a computing management system authentication procedures are secured by protecting keys and/or processes used during the procedures. some embodiments cryptographically protects any to mutually authenticate console and client. execution of one or more algorithms