Protecting security information in distributed systems
- 10 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 245-254
- https://doi.org/10.1109/risp.1991.130792
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- On the formal analysis of PKCS authentication protocolsPublished by Springer Nature ,2005
- How to Time-Stamp a Digital DocumentPublished by Springer Nature ,2001
- The MD4 Message Digest AlgorithmPublished by Springer Nature ,2001
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- A COMPARATIVE PERFORMANCE EXPERIMENT OF DYNAMIC SIGNATURE VERIFICATION DEVICESPublished by World Scientific Pub Co Pte Ltd ,1989
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976