Authentication

This helps to identify the source of the originator and other fields such as the date and time of creation of the information. This confirms that the receiver of the information is the one who is identified and verified by the sender. Authentication works based on credentials or keys. Only if the credentials match each other will the user who is accessing the file be authorized/allowed to access the information. Authentication can be enabled with the help of pre-shared private and public keys.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.66.178