Chapter 2

Authentication

Madjid Nakhjiri

Madjid Nakhjiri

Researcher and Network Architect

Motorola Labs, USA

Search for more papers by this author
Mahsa Nakhjiri

Mahsa Nakhjiri

Systems Engineer

Motorola Personal Devices, USA

Search for more papers by this author
First published: 09 September 2005

Summary

This chapter contains sections titled:

  • Examples of Authentication Mechanisms

  • Classes of Authentication Mechanisms

  • Further Resources

  • References

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.