메뉴 건너뛰기




Volumn 435 LNCS, Issue , 1990, Pages 35-43

The use of encryption in Kerberos for network authentication

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; SERVERS;

EID: 84983293158     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/0-387-34805-0_5     Document Type: Conference Paper
Times cited : (21)

References (10)
  • 1
    • 84976665942 scopus 로고
    • Timestamps in Key Distribution Protocols
    • August
    • Dorothy E. Denning and Giovanni Maria Sacco. Timestamps in Key Distribution Protocols. Communications of the ACM, 24(8):533–536, August 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 2
    • 0022114816 scopus 로고
    • Message Authentication
    • September
    • R. R. Jueneman et al. Message Authentication. IEEE Communications, 23(9):29–40, September 1985.
    • (1985) IEEE Communications , vol.23 , Issue.9 , pp. 29-40
    • Jueneman, R.R.1
  • 5
    • 0018048246 scopus 로고    scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • Dec 78
    • Roger M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993–999, Dec 78.
    • Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 6
    • 0003508568 scopus 로고
    • Federal Information Processing Standards Publication
    • National Bureau of Standards. Data Encryption Standard. Federal Information Processing Standards Publication, 46, 1977.
    • (1977) Data Encryption Standard , pp. 46
  • 7
    • 0004246335 scopus 로고
    • Federal Information Processing Standards Publication
    • National Bureau of Standards. DES Modes of Operation. Federal Information Processing Standards Publication, 81, 1980.
    • (1980) DES Modes of Operation , pp. 81
  • 9
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • June
    • Victor L. Voydock and Stephen T. Kent. Security mechanisms in high-level network protocols. Computing Surveys, 15(2):135–171, June 1983.
    • (1983) Computing Surveys , vol.15 , Issue.2 , pp. 135-171
    • Voydock, V.L.1    Kent, S.T.2
  • 10
    • 0019526857 scopus 로고
    • Timer-Based Mechanisms in Reliable Transport Protocol Connection Management
    • R. W. Watson. Timer-Based Mechanisms in Reliable Transport Protocol Connection Management. Computer Networks, 5, 1981.
    • (1981) Computer Networks , pp. 5
    • Watson, R.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.