ACM SIGMOD Anthology TKDE dblp.uni-trier.de

A Protocol for Establishing Secure Communication Channels in a Large Network.

Lein Harn, David Huang: A Protocol for Establishing Secure Communication Channels in a Large Network. IEEE Trans. Knowl. Data Eng. 6(1): 188-191(1994)
@article{DBLP:journals/tkde/HarnH94,
  author    = {Lein Harn and
               David Huang},
  title     = {A Protocol for Establishing Secure Communication Channels in
               a Large Network},
  journal   = {IEEE Trans. Knowl. Data Eng.},
  volume    = {6},
  number    = {1},
  year      = {1994},
  pages     = {188-191},
  ee        = {db/journals/tkde/HarnH94.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

Copyright © 1994 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.


Joint ACM SIGMOD / IEEE Computer Society Anthology

CDROM Version: Load the CDROM "Volume 3 Issue 3, TKDE 1993-1995" and ... DVD Version: Load ACM SIGMOD Anthology DVD 2" and ... BibTeX

References

[1]
...
[2]
...
[3]
Ralph C. Merkle: Protocols for Public Key Cryptosystems. IEEE Symposium on Security and Privacy 1980: 122-134 BibTeX
[4]
Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder: A Global Authentication Service without Global Trust. IEEE Symposium on Security and Privacy 1986: 223-230 BibTeX
[5]
Adi Shamir: Identity-Based Cryptosystems and Signature Schemes. CRYPTO 1984: 47-53 BibTeX
[6]
...
[7]
Kenji Koyama, Kazuo Ohta: Identity-based Conference Key Distribution Systems. CRYPTO 1987: 175-184 BibTeX
[8]
Eiji Okamoto: Key Distribution Systems Based on Identification Information. CRYPTO 1987: 194-202 BibTeX
[9]
...
[10]
...
[11]
...
[12]
Roger M. Needham, Michael D. Schroeder: Using Encryption for Authentication in Large Networks of Computers. Commun. ACM 21(12): 993-999(1978) BibTeX
[13]
Ronald L. Rivest, Adi Shamir, Leonard M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 21(2): 120-126(1978) BibTeX
[14]
Gustavus J. Simmons: An Impersonation-Proof Identity Verfication Scheme. CRYPTO 1987: 211-215 BibTeX
[15]
Dorothy E. Denning: Cryptography and Data Security. Addison-Wesley 1982
BibTeX
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
IEEE Transactions on Data and Knowledge Engineering: Copyright © by IEEE,
Joint ACM SIGMOD / IEEE Computer Society Anthology: Copyright © by ACM (info@acm.org) and IEEE, Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:28:00 2009