Protection and security issues for future systems
- 19 November 2005
- book chapter
- Published by Springer Nature
- p. 183-201
- https://doi.org/10.1007/bfb0024542
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Cascaded authenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- SPX: global authentication using public key certificatesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Experiences with the Amoeba distributed operating systemCommunications of the ACM, 1990
- Reducing risks from poorly chosen keysPublished by Association for Computing Machinery (ACM) ,1989
- A model for the containment of computer virusesPublished by American Institute of Aeronautics and Astronautics (AIAA) ,1986
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- The protection of information in computer systemsProceedings of the IEEE, 1975