next up previous
Next: 3.4.1 What are Kerberos, Up: 3 How Can Security Previous: 3.3.9 What about non-repudiatability

3.4 Transaction Security



 

Denis Arnaud
12/19/1997