Computer Science ›› 2006, Vol. 33 ›› Issue (11): 61-63.
Previous Articles Next Articles
YU Guo-Liang, HAN Wen-Bao (Department of Information Research, Information Engineering University, Zhengzhou 450002)
Online:
Published:
Abstract: In current Jini systems, users are authenticated by service providers, however, users can not authenticate service providers. To protect system security, this paper suggests a new authentication scheme using hash function with key, so that authentication
Key words: Jini, JVM,Authentication,Proxy
YU Guo-Liang, HAN Wen-Bao (Department of Information Research, Information Engineering University, Zhengzhou 450002). [J].Computer Science, 2006, 33(11): 61-63.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I11/61
Cited