메뉴 건너뛰기




Volumn 37, Issue 10, 1989, Pages 1014-1023

Secure Communication in Internet Environments: A Hierarchical Key Management Scheme for End-To-End Encryption

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS--PROTOCOLS; DATA PROCESSING--SECURITY OF DATA; SYSTEMS SCIENCE AND CYBERNETICS--HIERARCHICAL SYSTEMS;

EID: 0024749621     PISSN: 00906778     EISSN: None     Source Type: Journal    
DOI: 10.1109/26.41153     Document Type: Article
Times cited : (23)

References (22)
  • 1
    • 0017926566 scopus 로고
    • A cryptographic key management scheme for implementing the data encryption standard
    • Feb.
    • W.F. Ehrsam, S.M. Matyas, C.H. Meyer, and W.L. Tuchman, “A cryptographic key management scheme for implementing the data encryption standard,” IBM Syst. J., vol. 17, pp. 106–125, Feb. 1978.
    • (1978) IBM Syst. J. , vol.17 , pp. 106-125
    • Ehrsam, W.F.1    Matyas, S.M.2    Meyer, C.H.3    Tuchman, W.L.4
  • 2
    • 0017914899 scopus 로고
    • Generation, distribution, and installation of cryptographic keys
    • Feb.
    • S.M. Matyas and C.H. Meyer, “Generation, distribution, and installation of cryptographic keys,” IBM Syst. J., vol. 17, pp. 126–137, Feb. 1978.
    • (1978) IBM Syst. J. , vol.17 , pp. 126-137
    • Matyas, S.M.1    Meyer, C.H.2
  • 3
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks for computers
    • Dec
    • R.M. Needham and M.D. Schroeder, “Using encryption for authentication in large networks for computers” Commun. ACM, vol. 21, pp. 993–999, Dec, 1978.
    • (1978) Commun. ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 4
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • Aug.
    • D.E. Denning and G.M. Sacco, “Timestamps in key distribution protocols,” Commun. ACM, vol. 24, pp. 533–536, Aug. 1981.
    • (1981) Commun. ACM , vol.24 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 5
    • 84976731140 scopus 로고
    • A key distribution protocol using event markers
    • May
    • R.C. Bauer, T.A. Berson, and R.J. Feiertag, “A key distribution protocol using event markers,” ACM Trans. Comput. Syst., vol. 1, pp. 249–255, May 1983.
    • (1983) ACM Trans. Comput. Syst. , vol.1 , pp. 249-255
    • Bauer, R.C.1    Berson, T.A.2    Feiertag, R.J.3
  • 7
    • 0018030719 scopus 로고
    • Issues in packet network interconnection
    • Nov.
    • V. Cerf and P. Kirstein, “Issues in packet network interconnection,” Proc. IEEE, vol. 66, pp. 1386–1408, Nov. 1978.
    • (1978) Proc. IEEE , vol.66 , pp. 1386-1408
    • Cerf, V.1    Kirstein, P.2
  • 9
    • 0019009078 scopus 로고
    • OSI reference model—The ISO model of architecture for open system interconnection
    • Apr.
    • H. Zimmerman, “OSI reference model—The ISO model of architecture for open system interconnection,” IEEE Trans. Commun., vol. COM-28, pp. 425–432, Apr. 1980.
    • (1980) IEEE Trans. Commun. , vol.28 COM , pp. 425-432
    • Zimmerman, H.1
  • 11
    • 0017018484 scopus 로고
    • New direction in cryptography
    • Nov.
    • W. Diffie and M.E. Hellman, “New direction in cryptography,” IEEE Trans. Inform. Theory, vol. IT-22, pp. 644–654, Nov. 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.22 IT , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 12
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Feb.
    • R.L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Commun. ACM, vol. 21, pp. 120–126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 13
    • 84941437535 scopus 로고
    • LocalNet 50/100 Network Control Center Ref. Man., Sytek, Inc.
    • LocalNet 50/100 Network Control Center Ref. Man., Sytek, Inc., 1983.
    • (1983)
  • 14
    • 0022791802 scopus 로고
    • On the decomposition of large communication networks for hierarchical control implementation
    • Oct.
    • K.H. Muralidhar and M.K. Sundareshan, “On the decomposition of large communication networks for hierarchical control implementation,” IEEE Trans. Commun., vol. COM-34, pp. 985–988, Oct. 1986.
    • (1986) IEEE Trans. Commun. , vol.34 COM , pp. 985-988
    • Muralidhar, K.H.1    Sundareshan, M.K.2
  • 16
    • 84941479008 scopus 로고
    • ANSI X 9.17 Financial Institution Key Management (Wholesale) Standard, American Banker Association, Washington, DC, Apr. 1985.
    • (1985)
  • 17
    • 84937394128 scopus 로고    scopus 로고
    • Formal verification of a secure network with end-to-end encryption
    • D.E. Britton, “Formal verification of a secure network with end-to-end encryption,” in Proc. 1984 IEEE Symp. Security Privacy, pp. 154–166.
    • Proc. 1984 IEEE Symp. Security Privacy , pp. 154-166
    • Britton, D.E.1
  • 19
    • 0020127727 scopus 로고
    • A key management scheme for end-to-end encryption and a formal verification of its security
    • May-June
    • T. Kasami, S. Yamamura, and K. Mori, “A key management scheme for end-to-end encryption and a formal verification of its security,” Syst., Comput., Cont., vol. 13, pp. 59–69, May-June, 1982.
    • (1982) Syst., Comput., Cont. , vol.13 , pp. 59-69
    • Kasami, T.1    Yamamura, S.2    Mori, K.3
  • 20
    • 84976811006 scopus 로고
    • Confluent reductions: Abstract properties and applications to term rewriting systems
    • Oct.
    • G. Huet, “Confluent reductions: Abstract properties and applications to term rewriting systems,” J. ACM, vol. 27, pp. 797–821, Oct., 1980.
    • (1980) J. ACM , vol.27 , pp. 797-821
    • Huet, G.1
  • 21
    • 0016115082 scopus 로고
    • Testing for the Church-Rosser property
    • Oct.
    • R. Sethi, “Testing for the Church-Rosser property,” J. ACM, vol. 21, pp. 671–679, Oct. 1974.
    • (1974) J. ACM , vol.21 , pp. 671-679
    • Sethi, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.