Secure end-to-end delegations in distributed systems
- 31 March 1994
- journal article
- Published by Elsevier in Computer Communications
- Vol. 17 (3) , 230-238
- https://doi.org/10.1016/0140-3664(94)90008-6
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Authentication in distributed systemsACM Transactions on Computer Systems, 1992
- Authentication for distributed systemsComputer, 1992
- Network security via private-key certificatesACM SIGOPS Operating Systems Review, 1990
- Telecommunications management network (TMN) architecture and interworking designsIEEE Journal on Selected Areas in Communications, 1988
- Authentication and discretionary access control in computer networksComputer Networks and ISDN Systems, 1985
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976