{"title":"Specification of Key Distribution Protocols for Networks","authors":"D. Sidhu","doi":"10.1109/SP.1982.10000","DOIUrl":null,"url":null,"abstract":"Computer communication networks provide means for user-computer, user-user, computer-computer interaction where the two communicating entities may be ●t remote places. A user at one site has potential access to the resources of all the computers connected throygh the network. A network-wide and foolproof authentication scheme is needed to allow authorized access to resources and also to prevent spoofing. Such an authentication ●echanism is also needed for charging a customer for the use of ● system resources, remote updating of software, etc.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"213 1","pages":"90"},"PeriodicalIF":0.0000,"publicationDate":"1982-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SP.1982.10000","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Computer communication networks provide means for user-computer, user-user, computer-computer interaction where the two communicating entities may be ●t remote places. A user at one site has potential access to the resources of all the computers connected throygh the network. A network-wide and foolproof authentication scheme is needed to allow authorized access to resources and also to prevent spoofing. Such an authentication ●echanism is also needed for charging a customer for the use of ● system resources, remote updating of software, etc.