ABSTRACT
We have introduced entity authentication in Chapter 6 when explaining why
authentication server is needed in handling large-scale access authentications.
In Chapter 7, when introducing protocols to establish protected communica-
tions between two parties, mutual authentication is presented as a subroutine
to assure both parties that the claimed identity does belong to the party it
communicates with. In this chapter, we discuss access authentication.