Authentication for mobile computing
Department of Computer and Information Science
Master of Science
Parker, Bruce David
Stoyenko, Alexander D.
Portable computer--Access control
Host mobility is becoming an increasingly important feature with the recent arrival of laptop and palmtop computers, the development of wireless network interfaces and the implementation of global networks. Unfortunately, this mobile environment is also much more vulnerable to penetration by intruders. A possible means of protection can be authentication. This guarantees the identity of a communication peer.
This thesis studies the constraints imposed on the mobile environment with respect to authentication. It compares the two prevailing authentication mechanisms, Kerberos and SPX, and tries to make suggestions of how a mechanism can be adapted to the mobile environment.
njit-etd1994-012 (55 pages ~ 2,661 KB pdf)
Please complete this Feedback Form to inform us about your experience using this website. It will assist us in better serving your information needs in the future. Thank You!
If you have any questions please contact the Digital Projects Librarian
Created March 2, 2004