-
1
-
-
0000874415
-
Limitations of the kerberos authenication system
-
S. M. Bellovin and M. Merritt Limitations of the kerberos authenication system. Computer Commun. Rev., vol. 20, no. 5, pp. 119–132, Oct. 1990.
-
(1990)
Computer Commun. Rev.
, vol.20
, Issue.5
, pp. 119-132
-
-
Bellovin, S.M.1
Merritt, M.2
-
2
-
-
0025479451
-
Project Athena as a distributed computer system
-
G. A. Champine. D. E. Geer, Jr., and William N. Ruh. Project Athena as a distributed computer system, IEEE Computer, vol. 23, no. 9, pp. 40–51. Sept. 1990.
-
(1990)
IEEE Computer
, vol.23
, Issue.9
, pp. 40-51
-
-
Champine, G.A.1
Geer, D.E.2
Ruh, W.N.3
-
5
-
-
84938443608
-
-
Technical Report Corporation Cyber SAFE, 2443 152nd Avenue NE Redmond WA 98052USA:Trrequest@ocsg
-
Cyber SAFE Corporation. Deploying Kerberos for large organizations. Technical Report 94–47, Cyber SAFE Corporation, 2443 152nd Avenue NE Redmond WA 98052 USA: Trrequest@ocsg.com.
-
Cyber SAFE Corporation. Deploying Kerberos for large organizations
-
-
-
6
-
-
84976665942
-
Timestamps in key distribution protocols
-
D. E. Denning and G. M. Sacco, Timestamps in key distribution protocols. Commun. of the ACM. vol. 24. no. 8.00.533-536. Aug. 1981.
-
(1981)
Commun. of the ACM.
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
7
-
-
0017018484
-
New directions in cryptography
-
W, Diffle and M. E. Hellman. New directions in cryptography, IEEE Trans. on info. Theory. vol, 22. no, 6. 00.644-654. Nov. 1976.
-
(1976)
IEEE Trans. on info. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffle, W.1
Hellman, M.E.2
-
8
-
-
63649083604
-
Kerberos users’ frequently asked questions, periodically posted to Usenet newsgroup comp.protocols.kerberos
-
B. Jaspan, Kerberos users’ frequently asked questions, periodically posted to Usenet newsgroup comp.protocols.kerberos. April 1994.
-
(1994)
-
-
Jaspan, B.1
-
9
-
-
0040268965
-
Internet privacy enhanced mail
-
S. T. Kent, Internet privacy enhanced mail, Commun. of the ACM, vol. 36, no, 8. pp.48-60, Aug. 1993.
-
(1993)
Commun. of the ACM
, vol.36
, Issue.8
, pp. 48-60
-
-
Kent, S.T.1
-
11
-
-
0002548429
-
The evolution of the Kerberos authentication system
-
IEEE Computer Society Press
-
J. T. Kohl, B. C. Neuman, and T, Y. T'so, The evolution of the Kerberos authentication system, Distributed Open Systems, (IEEE Computer Society Press. 1994). pp. 78–94.
-
(1994)
Distributed Open Systems
, pp. 78-94
-
-
Kohl, J.T.1
Neuman, B.C.2
T'so, T.Y.3
-
12
-
-
0042277157
-
Generic security service application program interface
-
J. Linn, Generic security service application program interface, Internet RFC 1508, Sept. 1993
-
(1993)
Internet RFC 1508
-
-
Linn, J.1
-
13
-
-
0018048246
-
-
R. M. Needham and M. D. Schroeder, Using encryption for authentication in large networks of computers, Commun. of the ACM, vol 21, no 12, pp. 993-999, Dec. 1978
-
(1978)
Using encryption for authentication in large networks computers of Commun. of ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
15
-
-
0002088427
-
A note on the use of timestamps as nonces
-
B. C. Neuman and S. G. Stubblebine. A note on the use of timestamps as nonces, Operating Sys. Rev., vol, 27, no. 2, pp. 10–14, April 1993.
-
(1993)
Operating Sys. Rev.
, vol.27
, Issue.2
, pp. 10-14
-
-
Neuman, B.C.1
Stubblebine, S.G.2
-
16
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. L Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Commun. of the ACM, vol, 21. no, 2, pp. 120–126. Feb. 1978.
-
(1978)
Commun. of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
|