Chapter 8 Protection
Part of the Lecture Notes in Computer Science book series (LNCS, volume 184)
KeywordsShared Secret Authentication Server Cipher Text Registration Service Encryption Operation
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
- [Needham82]The Cambridge Distributed Computing System R.M. Needham and A.J. Herbert, Addison-Wesley 1982Google Scholar
- [Birrell82]Grapevine, an Experiment in Distributed Computing A.D. Birrell, R. Levin, R.M. Needham and M.D. Schroeder CACM 25, 4 April 1982Google Scholar
- [Denning82]Cryptography and Data Security D.E.Denning, Addison-Wesley 1982Google Scholar
- [Needham78]Using encryption for authentication in large networks of computers R.M. Needham and M.D. Schroeder, CACM 21, 12 Dec. 1978Google Scholar
© Springer-Verlag Berlin Heidelberg 1985