Chapter 8 Protection

  • R. M. Needham
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 184)


Shared Secret Authentication Server Cipher Text Registration Service Encryption Operation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

6. References

  1. [Needham82]
    The Cambridge Distributed Computing System R.M. Needham and A.J. Herbert, Addison-Wesley 1982Google Scholar
  2. [Birrell82]
    Grapevine, an Experiment in Distributed Computing A.D. Birrell, R. Levin, R.M. Needham and M.D. Schroeder CACM 25, 4 April 1982Google Scholar
  3. [Denning82]
    Cryptography and Data Security D.E.Denning, Addison-Wesley 1982Google Scholar
  4. [Needham78]
    Using encryption for authentication in large networks of computers R.M. Needham and M.D. Schroeder, CACM 21, 12 Dec. 1978Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1985

Authors and Affiliations

  • R. M. Needham
    • 1
  1. 1.The Computer LaboratoryUniversity of CambridgeCambridgeUK

Personalised recommendations