ABSTRACT

We have introduced entity authentication in Chapter 6 when explaining why

authentication server is needed in handling large-scale access authentications.

In Chapter 7, when introducing protocols to establish protected communica-

tions between two parties, mutual authentication is presented as a subroutine

to assure both parties that the claimed identity does belong to the party it

communicates with. In this chapter, we discuss access authentication.