Publication | Open Access
Using encryption for authentication in large networks of computers
2.3K
Citations
6
References
1978
Year
EngineeringAuthentication ProtocolInformation SecuritySignature VerificationDocument Integrity GuaranteeCloud ComputingCryptographic TechnologyCryptographic ProtectionComputer ScienceCryptographic ProtocolAuthenticated MailFormal VerificationSecure ProtocolLarge NetworksData SecurityCryptography
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.
| Year | Citations | |
|---|---|---|
Page 1
Page 1