Placement of Cryptographic Key Distribution Within OSI: Design Alternatives and Assessment
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[3] Whitfield Diffie,et al. Security for the DoD Transmission Control Protocol , 1986, CRYPTO.
[4] Christoph G. Günther,et al. An Identity-Based Key-Exchange Protocol , 1990, EUROCRYPT.
[5] Kenji Koyama. Identity-based conference key distribution system , 1987 .
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Kenji Koyama,et al. Identity-based conference key distribution systems , 1987, Systems and Computers in Japan.
[8] Owen Rees,et al. Efficient and timely mutual authentication , 1987, OPSR.
[9] Raju Ramaswamy. A key management algorithm for secure communication in open systems interconnection architecture , 1990, Comput. Secur..
[10] E. Okamoto. Proposal for identity-based key distribution systems , 1986 .
[11] Hans-Joachim Knobloch,et al. How to Keep Authenticity Alive in a Computer Network , 1990, EUROCRYPT.
[12] B. J. Herbison,et al. Developing Ethernet Enhanced-Security System , 1988, CRYPTO.
[13] Rainer A. Rueppel,et al. Key Agreements Based on Function Composition , 1988, EUROCRYPT.