An approach to key management and inter-domain authentication in the telecommunications management network
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Martín Abadi,et al. Authentication in distributed systems: theory and practice , 1991, SOSP '91.
[3] Morrie Gasser,et al. An architecture for practical delegation in a distributed system , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[5] John Rushby. A Trusted Computing Base for Embedded Systems , 1984 .
[6] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[7] Stephen T. Kent,et al. Security Mechanisms in High-Level Network Protocols , 1983, CSUR.
[8] Ralph Howard,et al. Data encryption standard , 1987 .
[9] Jennifer Seberry,et al. Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract) , 1992, CRYPTO.
[10] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.