Authentication consists of two acts: first, the act of providing proof of authenticity for the information that is being delivered or stored, and second, the act of verifying the proof of authenticity for the information that is being received or retrieved.
- Authentication Concepts
- from AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
- Publisher: John Wiley & Sons
- Released: October 2005
Share this highlighthttp://www.safaribooksonline.com/a/aaa-and-network/2089075/