Authentication in distributed systems
- 1 September 1991
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 165-182
- https://doi.org/10.1145/121132.121160
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- Network security via private-key certificatesACM SIGOPS Operating Systems Review, 1990
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Hardware speedups in long integer multiplicationPublished by Association for Computing Machinery (ACM) ,1990
- End-to-end arguments in system designACM Transactions on Computer Systems, 1984
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- A lattice model of secure information flowCommunications of the ACM, 1976
- ProtectionACM SIGOPS Operating Systems Review, 1974