A Protocol for Establishing Secure Communication Channels in a Large Network.
Lein Harn, David Huang:
A Protocol for Establishing Secure Communication Channels in a Large Network.
IEEE Trans. Knowl. Data Eng. 6(1): 188-191(1994)@article{DBLP:journals/tkde/HarnH94,
author = {Lein Harn and
David Huang},
title = {A Protocol for Establishing Secure Communication Channels in
a Large Network},
journal = {IEEE Trans. Knowl. Data Eng.},
volume = {6},
number = {1},
year = {1994},
pages = {188-191},
ee = {db/journals/tkde/HarnH94.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
Copyright © 1994 by The Institute of
Electrical and Electronic Engineers, Inc. (IEEE).
Abstract used with permission.
CDROM Version: Load the CDROM "Volume 3 Issue 3, TKDE 1993-1995" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 2" and ...
BibTeX
References
- [1]
- ...
- [2]
- ...
- [3]
- Ralph C. Merkle:
Protocols for Public Key Cryptosystems.
IEEE Symposium on Security and Privacy 1980: 122-134 BibTeX
- [4]
- Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder:
A Global Authentication Service without Global Trust.
IEEE Symposium on Security and Privacy 1986: 223-230 BibTeX
- [5]
- Adi Shamir:
Identity-Based Cryptosystems and Signature Schemes.
CRYPTO 1984: 47-53 BibTeX
- [6]
- ...
- [7]
- Kenji Koyama, Kazuo Ohta:
Identity-based Conference Key Distribution Systems.
CRYPTO 1987: 175-184 BibTeX
- [8]
- Eiji Okamoto:
Key Distribution Systems Based on Identification Information.
CRYPTO 1987: 194-202 BibTeX
- [9]
- ...
- [10]
- ...
- [11]
- ...
- [12]
- Roger M. Needham, Michael D. Schroeder:
Using Encryption for Authentication in Large Networks of Computers.
Commun. ACM 21(12): 993-999(1978) BibTeX
- [13]
- Ronald L. Rivest, Adi Shamir, Leonard M. Adleman:
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.
Commun. ACM 21(2): 120-126(1978) BibTeX
- [14]
- Gustavus J. Simmons:
An Impersonation-Proof Identity Verfication Scheme.
CRYPTO 1987: 211-215 BibTeX
- [15]
- Dorothy E. Denning:
Cryptography and Data Security.
Addison-Wesley 1982
BibTeX
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
IEEE Transactions on Data and Knowledge Engineering: Copyright © by IEEE,
Joint ACM SIGMOD / IEEE Computer Society Anthology: Copyright © by ACM (info@acm.org) and IEEE, Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:28:00 2009