Authentication Schemes and Their Construction for Dynamic Conferences
暂无分享,去创建一个
In the paper,we discuss two important authentication schemes used in network security:authentication schemes for dynamic conferences and authentication schemes for computer networks with topology which is not the complete graph.We show the size of the secret key space for each participant under the security level and provide their constructions