Skip to main content

Chapter 8 Protection

  • Conference paper
  • First Online:
Local Area Networks: An Advanced Course

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 184))

  • 127 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

6. References

  1. The Cambridge Distributed Computing System R.M. Needham and A.J. Herbert, Addison-Wesley 1982

    Google Scholar 

  2. Grapevine, an Experiment in Distributed Computing A.D. Birrell, R. Levin, R.M. Needham and M.D. Schroeder CACM 25, 4 April 1982

    Google Scholar 

  3. Cryptography and Data Security D.E.Denning, Addison-Wesley 1982

    Google Scholar 

  4. Using encryption for authentication in large networks of computers R.M. Needham and M.D. Schroeder, CACM 21, 12 Dec. 1978

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

D. Hutchison J. A. Mariani W. D. Shepherd

Rights and permissions

Reprints and permissions

Copyright information

© 1985 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Needham, R.M. (1985). Chapter 8 Protection. In: Hutchison, D., Mariani, J.A., Shepherd, W.D. (eds) Local Area Networks: An Advanced Course. Lecture Notes in Computer Science, vol 184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-15191-5_23

Download citation

  • DOI: https://doi.org/10.1007/3-540-15191-5_23

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-15191-3

  • Online ISBN: 978-3-540-39286-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics