Path independence for authentication in large-scale systems
- 1 April 1997
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Internet Privacy Enhanced MailCommunications of the ACM, 1993
- Authentication in distributed systemsACM Transactions on Computer Systems, 1992
- Implementing fault-tolerant services using the state machine approach: a tutorialACM Computing Surveys, 1990
- A Global Authentication Service without Global TrustPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- Heuristics for finding a maximum number of disjoint bounded pathsNetworks, 1984
- The complexity of finding maximum disjoint paths with length constraintsNetworks, 1982
- Mengerian theorems for paths of bounded lengthPeriodica Mathematica Hungarica, 1978
- Disjoint paths in a networkNetworks, 1974
- A note on two problems in connexion with graphsNumerische Mathematik, 1959