Security Mechanisms in High-Level Network Protocols
- 1 June 1983
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Computing Surveys
- Vol. 15 (2) , 135-171
- https://doi.org/10.1145/356909.356913
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- EthernetCommunications of the ACM, 1983
- On the security of multiple encryptionCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- Hiding information and signatures in trapdoor knapsacksIEEE Transactions on Information Theory, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- A cryptographic key management scheme for implementing the Data Encryption StandardIBM Systems Journal, 1978
- Generation, distribution, and installation of cryptographic keysIBM Systems Journal, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- EthernetCommunications of the ACM, 1976
- The protection of information in computer systemsProceedings of the IEEE, 1975