Distributed systems security
暂无分享,去创建一个
[1] Stephen M. Matyas,et al. A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard , 1978, IBM Syst. J..
[2] Stephen T. Kent,et al. Security Mechanisms in High-Level Network Protocols , 1983, CSUR.
[3] R. Jueneman,et al. Message authentication , 1985, IEEE Communications Magazine.
[4] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[5] Sead Muftic. Security Mechanisms for Computer Networks , 1988, Comput. Networks.
[6] Andrew S. Tanenbaum,et al. Protection and Resource Control in Distributed Operating Systems , 1984, Comput. Networks.
[7] Charles Cresson Wood,et al. Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.
[8] David K. Gifford. Cryptographic sealing for information secrecy and authentication , 1982, CACM.
[9] Butler W. Lampson,et al. A Global Authentication Service without Global Trust , 1986, 1986 IEEE Symposium on Security and Privacy.
[10] Thomas A. Berson,et al. A key distribution protocol using event markers , 1983, TOCS.
[11] David Alan Hanson,et al. Data security , 1979, ACM-SE 17.
[12] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[13] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[14] Gerald J. Popek,et al. Encryption and Secure Computer Networks , 1979, CSUR.
[15] Philip Zimmermann,et al. A Proposed Standard Format for RSA Cryptosystems , 1986, Computer.
[16] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[17] Stephen M. Matyas,et al. Generation, Distribution, and Installation of Cryptographic Keys , 1978, IBM Syst. J..
[18] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[19] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[20] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[21] Andrew Birrell. Secure communication using remote procedure calls , 1985, TOCS.
[22] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[23] Stephen M. Matyas,et al. Cryptography: A New Dimension in Computer Data Security--A Guide for the Design and Implementation of Secure Systems , 1982 .
[24] Anita K. Jones. Protection Mechanisms and the Enforcement of Security Policies , 1978, Advanced Course: Operating Systems.