-
1
-
-
0017926566
-
A cryptographic key management scheme for implementing the data encryption standard
-
Feb.
-
W.F. Ehrsam, S.M. Matyas, C.H. Meyer, and W.L. Tuchman, “A cryptographic key management scheme for implementing the data encryption standard,” IBM Syst. J., vol. 17, pp. 106–125, Feb. 1978.
-
(1978)
IBM Syst. J.
, vol.17
, pp. 106-125
-
-
Ehrsam, W.F.1
Matyas, S.M.2
Meyer, C.H.3
Tuchman, W.L.4
-
2
-
-
0017914899
-
Generation, distribution, and installation of cryptographic keys
-
Feb.
-
S.M. Matyas and C.H. Meyer, “Generation, distribution, and installation of cryptographic keys,” IBM Syst. J., vol. 17, pp. 126–137, Feb. 1978.
-
(1978)
IBM Syst. J.
, vol.17
, pp. 126-137
-
-
Matyas, S.M.1
Meyer, C.H.2
-
3
-
-
0018048246
-
Using encryption for authentication in large networks for computers
-
Dec
-
R.M. Needham and M.D. Schroeder, “Using encryption for authentication in large networks for computers” Commun. ACM, vol. 21, pp. 993–999, Dec, 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
4
-
-
84976665942
-
Timestamps in key distribution protocols
-
Aug.
-
D.E. Denning and G.M. Sacco, “Timestamps in key distribution protocols,” Commun. ACM, vol. 24, pp. 533–536, Aug. 1981.
-
(1981)
Commun. ACM
, vol.24
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
5
-
-
84976731140
-
A key distribution protocol using event markers
-
May
-
R.C. Bauer, T.A. Berson, and R.J. Feiertag, “A key distribution protocol using event markers,” ACM Trans. Comput. Syst., vol. 1, pp. 249–255, May 1983.
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, pp. 249-255
-
-
Bauer, R.C.1
Berson, T.A.2
Feiertag, R.J.3
-
7
-
-
0018030719
-
Issues in packet network interconnection
-
Nov.
-
V. Cerf and P. Kirstein, “Issues in packet network interconnection,” Proc. IEEE, vol. 66, pp. 1386–1408, Nov. 1978.
-
(1978)
Proc. IEEE
, vol.66
, pp. 1386-1408
-
-
Cerf, V.1
Kirstein, P.2
-
8
-
-
84941455415
-
-
Rep. #2, Eng. Experiment Station, Univ. Arizona, Jan.
-
R. Martinez and M.K. Sundareshan, “Gateway design methodology for LocalNet 20-to-DDN interconnection,” Rep. #2, Eng. Experiment Station, Univ. Arizona, Jan. 1984.
-
(1984)
Gateway design methodology for LocalNet 20-to-DDN interconnection
-
-
Martinez, R.1
Sundareshan, M.K.2
-
9
-
-
0019009078
-
OSI reference model—The ISO model of architecture for open system interconnection
-
Apr.
-
H. Zimmerman, “OSI reference model—The ISO model of architecture for open system interconnection,” IEEE Trans. Commun., vol. COM-28, pp. 425–432, Apr. 1980.
-
(1980)
IEEE Trans. Commun.
, vol.28 COM
, pp. 425-432
-
-
Zimmerman, H.1
-
10
-
-
84941464122
-
-
Rep. #3, Eng. Experiment Station, Univ. Arizona, Nov.
-
M.K. Sundareshan and K.H. Muralidhar, “Addressing in internet environments,” Rep. #3, Eng. Experiment Station, Univ. Arizona, Nov. 1984.
-
(1984)
Addressing in internet environments
-
-
Sundareshan, M.K.1
Muralidhar, K.H.2
-
11
-
-
0017018484
-
New direction in cryptography
-
Nov.
-
W. Diffie and M.E. Hellman, “New direction in cryptography,” IEEE Trans. Inform. Theory, vol. IT-22, pp. 644–654, Nov. 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.22 IT
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
12
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Feb.
-
R.L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Commun. ACM, vol. 21, pp. 120–126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
13
-
-
84941437535
-
-
LocalNet 50/100 Network Control Center Ref. Man., Sytek, Inc.
-
LocalNet 50/100 Network Control Center Ref. Man., Sytek, Inc., 1983.
-
(1983)
-
-
-
14
-
-
0022791802
-
On the decomposition of large communication networks for hierarchical control implementation
-
Oct.
-
K.H. Muralidhar and M.K. Sundareshan, “On the decomposition of large communication networks for hierarchical control implementation,” IEEE Trans. Commun., vol. COM-34, pp. 985–988, Oct. 1986.
-
(1986)
IEEE Trans. Commun.
, vol.34 COM
, pp. 985-988
-
-
Muralidhar, K.H.1
Sundareshan, M.K.2
-
15
-
-
84941485666
-
-
Rep. DAEA 18–85-K-0065, Eng. Experiment Station, Univ. Arizona, Ian.
-
M.K. Sundareshan and W.P. Lu, “Encryption key management for secure communication in internet environments,” Rep. DAEA 18–85-K-0065, Eng. Experiment Station, Univ. Arizona, Ian. 1986.
-
(1986)
Encryption key management for secure communication in internet environments
-
-
Sundareshan, M.K.1
Lu, W.P.2
-
16
-
-
84941479008
-
-
ANSI X 9.17 Financial Institution Key Management (Wholesale) Standard, American Banker Association, Washington, DC, Apr. 1985.
-
(1985)
-
-
-
17
-
-
84937394128
-
Formal verification of a secure network with end-to-end encryption
-
D.E. Britton, “Formal verification of a secure network with end-to-end encryption,” in Proc. 1984 IEEE Symp. Security Privacy, pp. 154–166.
-
Proc. 1984 IEEE Symp. Security Privacy
, pp. 154-166
-
-
Britton, D.E.1
-
19
-
-
0020127727
-
A key management scheme for end-to-end encryption and a formal verification of its security
-
May-June
-
T. Kasami, S. Yamamura, and K. Mori, “A key management scheme for end-to-end encryption and a formal verification of its security,” Syst., Comput., Cont., vol. 13, pp. 59–69, May-June, 1982.
-
(1982)
Syst., Comput., Cont.
, vol.13
, pp. 59-69
-
-
Kasami, T.1
Yamamura, S.2
Mori, K.3
-
20
-
-
84976811006
-
Confluent reductions: Abstract properties and applications to term rewriting systems
-
Oct.
-
G. Huet, “Confluent reductions: Abstract properties and applications to term rewriting systems,” J. ACM, vol. 27, pp. 797–821, Oct., 1980.
-
(1980)
J. ACM
, vol.27
, pp. 797-821
-
-
Huet, G.1
-
21
-
-
0016115082
-
Testing for the Church-Rosser property
-
Oct.
-
R. Sethi, “Testing for the Church-Rosser property,” J. ACM, vol. 21, pp. 671–679, Oct. 1974.
-
(1974)
J. ACM
, vol.21
, pp. 671-679
-
-
Sethi, R.1
|