Protocols for Data Security
- 1 February 1983
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Computer
- Vol. 16 (2), 39-51
- https://doi.org/10.1109/mc.1983.1654298
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Probabilistic encryption & how to play mental poker keeping secret all partial informationPublished by Association for Computing Machinery (ACM) ,1982
- Password authentication with insecure communicationCommunications of the ACM, 1981
- On the security of public key protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1981
- A System Architecture to Support a Verifiably Secure Multilevel Security SystemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- Protocols for Public Key CryptosystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- Protecting Shared Cryptographic KeysPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- How to share a secretCommunications of the ACM, 1979
- Social processes and proofs of theorems and programsCommunications of the ACM, 1979
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978