Security in SAP

3/15/98


Click here to start


Table of Contents

Security in SAP

SAP Limitations

Encrypted SAP Packet Format

Authentication

Encryption

Algorithms

Algorithms

Progress of Implementation

Conclusion

Author: Edmund Whelan