-
7
-
-
0000874415
-
Limitations of the Kerberos authentication system
-
October
-
S.M. Bellovin and M. Merritt. Limitations of the Kerberos authentication system. Computer Communication Review, 20(5):119-132, October 1990.
-
(1990)
Computer Communication Review
, vol.20
, Issue.5
, pp. 119-132
-
-
Bellovin, S.M.1
Merritt, M.2
-
8
-
-
0013402235
-
Secure implementation of identification systems
-
S. Bengio, G. Brassard, Y.G. Desmedt, C. Goutier, and J. Quisquater. Secure implementation of identification systems. Journal of Cryptology, 4:175-183, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 175-183
-
-
Bengio, S.1
Brassard, G.2
Desmedt, Y.G.3
Goutier, C.4
Quisquater, J.5
-
9
-
-
0029513859
-
Key distribution without individual trusted authentication servers
-
IEEE Computer Society Press, Los Alamitos, California, June
-
L. Chen, D. Gollmann, and C. Mitchell. Key distribution without individual trusted authentication servers. In Proceedings: the 8th IEEE Computer Security Foundations Workshop, pages 30-36. IEEE Computer Society Press, Los Alamitos, California, June 1995.
-
(1995)
Proceedings: The 8th IEEE Computer Security Foundations Workshop
, pp. 30-36
-
-
Chen, L.1
Gollmann, D.2
Mitchell, C.3
-
11
-
-
0027617271
-
Increasing availability and security of an authentication service
-
L. Gong. Increasing availability and security of an authentication service. IEEE Journal on Selected Areas in Communications, 11:657-662, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, pp. 657-662
-
-
Gong, L.1
-
12
-
-
85055795738
-
Variations on the themes of message freshness and replay
-
IEEE Computer Society Press, Los Alamitos, California, June
-
L. Gong. Variations on the themes of message freshness and replay. In Proceedings: the Computer Security Foundations Workshop VI, pages 131-136. IEEE Computer Society Press, Los Alamitos, California, June 1993.
-
(1993)
Proceedings: The Computer Security Foundations Workshop VI
, pp. 131-136
-
-
Gong, L.1
-
14
-
-
0347265673
-
Conference key distribution protocols in distributed systems
-
P. G. Farrell, editor, Formara Limited. Southend-on-sea. Essex
-
B. Klein, M. Otten, and T. Beth. Conference key distribution protocols in distributed systems. In P. G. Farrell, editor, Codes and Cyphers, Proceedings of the Fourth IMA Conference on Cryptography and Coding, pages 225-241. Formara Limited. Southend-on-sea. Essex, 1995.
-
(1995)
Codes and Cyphers, Proceedings of the Fourth IMA Conference on Cryptography and Coding
, pp. 225-241
-
-
Klein, B.1
Otten, M.2
Beth, T.3
-
15
-
-
0141672390
-
Building an authentication service for distributed systems
-
K-Y. Lam. Building an authentication service for distributed systems. Journal of Computer Security, 2:73-84, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 73-84
-
-
Lam, K.-Y.1
-
18
-
-
19144365899
-
Standardising authentication protocols based on public key techniques
-
C. Mitchell and A. Thomas. Standardising authentication protocols based on public key techniques. Journal of Computer Security, 2:23-36, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 23-36
-
-
Mitchell, C.1
Thomas, A.2
-
19
-
-
84947924882
-
Fault-tolerant key distribution
-
Department of Computer Science, Cornell University, Ithaca, New York, January
-
M. Reiter, K. Birman, and R. van Renesse. Fault-tolerant key distribution. Technical Report 93-1325, Department of Computer Science, Cornell University, Ithaca, New York, January 1993.
-
(1993)
Technical Report 93-1325
-
-
Reiter, M.1
Birman, K.2
van Renesse, R.3
-
21
-
-
0347896017
-
Trust-based navigation in distributed systems
-
European Institute for System Security, Karlsruhe University
-
R. Yahalom, B. Klein, and T. Beth. Trust-based navigation in distributed systems. European Institute for System Security, Karlsruhe University, Technical Report 93/4, 1993.
-
(1993)
Technical Report 93/4
-
-
Yahalom, R.1
Klein, B.2
Beth, T.3
|