Search form

CSEC-472 Authentication and Security Models

Tue, 02/04/2014 - 11:19am -- gpltwc

As more users access remote systems, the job of identifying and authenticating those users at distance becomes increasingly difficult. The growing impact of attackers on identification and authentication systems puts additional strain on our ability to ensure that only authorized users obtain access to controlled or critical resources. This course reviews basic cryptology techniques and introduces their application to contemporary authentication methods. (CSCI-462 Introduction to Cryptography) Class 3, Credit 3 (Spring)