Design issues for secure computer networks

  • G. J. Popek
  • C. S. Kline
Chapter 3.: Issues And Results In The Design Of Operating Systems
Part of the Lecture Notes in Computer Science book series (LNCS, volume 60)


Encryption Algorithm Block Cipher Authentication Protocol Mutual Authentication User Process 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

8. Bibliography

  1. Branstedt,D., Security Aspects of Computer Networks, AIAA Computer Networks Conference, April 1973.Google Scholar
  2. Diffie, W. and M. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, November 1976, 644–654.Google Scholar
  3. Evans, A. et. al., A User Authentication Scheme Not Requiring Secrecy in the Computer, CACM Vol. 17 No. 8, August 1977, pp437–441.Google Scholar
  4. Gaines, R. S. private communication, September 1977.Google Scholar
  5. Kent, S. Encryption-based Protection Protocols for Interactive User-Computer Communication, Laboratory for Computer Science, MIT, TR 162, 1976.Google Scholar
  6. National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publication 46, January 1977.Google Scholar
  7. Needham, R. and M. Schroeder, Security and Authentication in Large Networks of Computers, Xerox Palo Alto Research Center Technical Report, September 1977.Google Scholar
  8. Rabin, M. "Digital Signatures Using Conventional Encryption Algorithms, Proceedings of the Conference on Fundamentals of Secure Computing, Atlanta Georgia, October 3–5, 1977 Academic Press (to appear).Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1978

Authors and Affiliations

  • G. J. Popek
    • 1
  • C. S. Kline
    • 1
  1. 1.University of California at Los AngelesLos AngelesUSA

Personalised recommendations