Kerberos authentication and authorization system
暂无分享,去创建一个
Jerome H. Saltzer | B. Clifford Neuman | Jeffrey I. Schiller | Stephen P. F. Miller | B. C. Neuman | J. Saltzer | J. Schiller | Steve Miller
[1] S. Kent. ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION , 1976 .
[2] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[3] A. J. Herbert. The Cambridge Distributed Computing System , 1983, Advanced Course: Local Area Networks.
[4] Roger M. Needham,et al. Grapevine: an exercise in distributed computing , 1982, CACM.
[5] R. Jueneman,et al. Message authentication , 1985, IEEE Communications Magazine.
[6] Thomas A. Berson,et al. A key distribution protocol using event markers , 1983, TOCS.
[7] Stephen T. Kent,et al. Security Mechanisms in High-Level Network Protocols , 1983, CSUR.
[8] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[9] Gerald J. Popek,et al. Encryption and Secure Computer Networks , 1979, CSUR.
[10] David K. Gifford. Cryptographic sealing for information secrecy and authentication , 1982, CACM.
[11] Andrew Birrell. Secure communication using remote procedure calls , 1985, TOCS.