Authentification for Distributed Systems
暂无分享,去创建一个
[1] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] A. Udaya Shankar,et al. Applying a theory of modules and interfaces to security verification , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[5] Gustavus J. Simmons,et al. Symmetric and Asymmetric Encryption , 1979, CSUR.
[6] K. S. Shankar,et al. Special Feature The Total Computer Security Problem: an Oveview , 1977, Computer.
[7] Jeffrey I. Schiller,et al. An Authentication Service for Open Network Systems. In , 1998 .
[8] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[9] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[10] J.J. Tardo,et al. SPX: global authentication using public key certificates , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[11] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[12] Morrie Gasser,et al. An architecture for practical delegation in a distributed system , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[13] J. Linn. Practical authentication for distributed computing , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[14] Thomas Y. C. Woo,et al. Authentication for distributed systems , 1997, Computer.
[15] Martín Abadi,et al. Authentication and Delegation with Smart-cards , 1991, TACS.
[16] Morrie Gasser,et al. The Digital Distributed System Security Architecture , 1989 .
[17] Steven M. Bellovin,et al. Limitations of the Kerberos authentication system , 1990, CCRV.