Computer Science ›› 2006, Vol. 33 ›› Issue (11): 61-63.

Previous Articles     Next Articles

YU Guo-Liang, HAN Wen-Bao (Department of Information Research, Information Engineering University, Zhengzhou 450002)   

  • Online:2018-11-17 Published:2018-11-17

Abstract: In current Jini systems, users are authenticated by service providers, however, users can not authenticate service providers. To protect system security, this paper suggests a new authentication scheme using hash function with key, so that authentication

Key words: Jini, JVM,Authentication,Proxy

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!