A security risk of depending on synchronized clocks
- 1 January 1992
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 26 (1), 49-53
- https://doi.org/10.1145/130704.130709
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- On replay detection in distributed systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Inside risks: the clock grows at midnightCommunications of the ACM, 1991
- Practical uses of synchronized clocks in distributed systemsPublished by Association for Computing Machinery (ACM) ,1991
- Limitations of the Kerberos authentication systemACM SIGCOMM Computer Communication Review, 1990
- Reducing risks from poorly chosen keysACM SIGOPS Operating Systems Review, 1989
- Network Time Protocol (version 2) specification and implementationPublished by RFC Editor ,1989
- Synchronizing clocks in the presence of faultsJournal of the ACM, 1985
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- Time, clocks, and the ordering of events in a distributed systemCommunications of the ACM, 1978