메뉴 건너뛰기




Volumn 1172, Issue , 1996, Pages 121-133

Tailoring authentication protocols to match underlying mechanisms

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84947927051     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0023293     Document Type: Conference Paper
Times cited : (1)

References (21)
  • 7
    • 0000874415 scopus 로고
    • Limitations of the Kerberos authentication system
    • October
    • S.M. Bellovin and M. Merritt. Limitations of the Kerberos authentication system. Computer Communication Review, 20(5):119-132, October 1990.
    • (1990) Computer Communication Review , vol.20 , Issue.5 , pp. 119-132
    • Bellovin, S.M.1    Merritt, M.2
  • 9
    • 0029513859 scopus 로고
    • Key distribution without individual trusted authentication servers
    • IEEE Computer Society Press, Los Alamitos, California, June
    • L. Chen, D. Gollmann, and C. Mitchell. Key distribution without individual trusted authentication servers. In Proceedings: the 8th IEEE Computer Security Foundations Workshop, pages 30-36. IEEE Computer Society Press, Los Alamitos, California, June 1995.
    • (1995) Proceedings: The 8th IEEE Computer Security Foundations Workshop , pp. 30-36
    • Chen, L.1    Gollmann, D.2    Mitchell, C.3
  • 11
    • 0027617271 scopus 로고
    • Increasing availability and security of an authentication service
    • L. Gong. Increasing availability and security of an authentication service. IEEE Journal on Selected Areas in Communications, 11:657-662, 1993.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , pp. 657-662
    • Gong, L.1
  • 12
    • 85055795738 scopus 로고
    • Variations on the themes of message freshness and replay
    • IEEE Computer Society Press, Los Alamitos, California, June
    • L. Gong. Variations on the themes of message freshness and replay. In Proceedings: the Computer Security Foundations Workshop VI, pages 131-136. IEEE Computer Society Press, Los Alamitos, California, June 1993.
    • (1993) Proceedings: The Computer Security Foundations Workshop VI , pp. 131-136
    • Gong, L.1
  • 15
    • 0141672390 scopus 로고
    • Building an authentication service for distributed systems
    • K-Y. Lam. Building an authentication service for distributed systems. Journal of Computer Security, 2:73-84, 1993.
    • (1993) Journal of Computer Security , vol.2 , pp. 73-84
    • Lam, K.-Y.1
  • 18
    • 19144365899 scopus 로고
    • Standardising authentication protocols based on public key techniques
    • C. Mitchell and A. Thomas. Standardising authentication protocols based on public key techniques. Journal of Computer Security, 2:23-36, 1993.
    • (1993) Journal of Computer Security , vol.2 , pp. 23-36
    • Mitchell, C.1    Thomas, A.2
  • 19
    • 84947924882 scopus 로고
    • Fault-tolerant key distribution
    • Department of Computer Science, Cornell University, Ithaca, New York, January
    • M. Reiter, K. Birman, and R. van Renesse. Fault-tolerant key distribution. Technical Report 93-1325, Department of Computer Science, Cornell University, Ithaca, New York, January 1993.
    • (1993) Technical Report 93-1325
    • Reiter, M.1    Birman, K.2    van Renesse, R.3
  • 21
    • 0347896017 scopus 로고
    • Trust-based navigation in distributed systems
    • European Institute for System Security, Karlsruhe University
    • R. Yahalom, B. Klein, and T. Beth. Trust-based navigation in distributed systems. European Institute for System Security, Karlsruhe University, Technical Report 93/4, 1993.
    • (1993) Technical Report 93/4
    • Yahalom, R.1    Klein, B.2    Beth, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.