{"title":"网络密钥分发协议规范","authors":"D. Sidhu","doi":"10.1109/SP.1982.10000","DOIUrl":null,"url":null,"abstract":"Computer communication networks provide means for user-computer, user-user, computer-computer interaction where the two communicating entities may be ●t remote places. A user at one site has potential access to the resources of all the computers connected throygh the network. A network-wide and foolproof authentication scheme is needed to allow authorized access to resources and also to prevent spoofing. Such an authentication ●echanism is also needed for charging a customer for the use of ● system resources, remote updating of software, etc.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"213 1","pages":"90"},"PeriodicalIF":0.0000,"publicationDate":"1982-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Specification of Key Distribution Protocols for Networks\",\"authors\":\"D. Sidhu\",\"doi\":\"10.1109/SP.1982.10000\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computer communication networks provide means for user-computer, user-user, computer-computer interaction where the two communicating entities may be ●t remote places. A user at one site has potential access to the resources of all the computers connected throygh the network. A network-wide and foolproof authentication scheme is needed to allow authorized access to resources and also to prevent spoofing. Such an authentication ●echanism is also needed for charging a customer for the use of ● system resources, remote updating of software, etc.\",\"PeriodicalId\":90300,\"journal\":{\"name\":\"Proceedings. IEEE Symposium on Security and Privacy\",\"volume\":\"213 1\",\"pages\":\"90\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1982-04-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. IEEE Symposium on Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SP.1982.10000\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SP.1982.10000","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Specification of Key Distribution Protocols for Networks
Computer communication networks provide means for user-computer, user-user, computer-computer interaction where the two communicating entities may be ●t remote places. A user at one site has potential access to the resources of all the computers connected throygh the network. A network-wide and foolproof authentication scheme is needed to allow authorized access to resources and also to prevent spoofing. Such an authentication ●echanism is also needed for charging a customer for the use of ● system resources, remote updating of software, etc.