Authentication protocols for computer networks: I
- 1 April 1986
- journal article
- Published by Elsevier in Computer Networks and ISDN Systems
- Vol. 11 (4) , 297-310
- https://doi.org/10.1016/0169-7552(86)90004-8
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Mechanical verification and automatic implementation of communication protocolsIEEE Transactions on Software Engineering, 1986
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Towards Analyzing and Synthesizing ProtocolsIEEE Transactions on Communications, 1980
- Encryption and Secure Computer NetworksACM Computing Surveys, 1979
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- General Technique for Communications Protocol ValidationIBM Journal of Research and Development, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- Interprocess Communication Protocols for Computer NetworksPublished by Defense Technical Information Center (DTIC) ,1975