Access Restriction

Author Needham, Roger M. ♦ Schroeder, Michael D.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Keyword Networks ♦ Protocols ♦ Public-key cryptosystems ♦ Data encryption standard ♦ Authentication ♦ Encryption ♦ Security
Abstract Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.
Description Affiliation: Xerox Palo Alto Research Center, Palo Alto, CA (Needham, Roger M.; Schroeder, Michael D.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 21
Issue Number 12
Page Count 7
Starting Page 993
Ending Page 999

Open content in new tab

   Open content in new tab
Source: ACM Digital Library