Preview
Unable to display preview. Download preview PDF.
8. Bibliography
Branstedt,D., Security Aspects of Computer Networks, AIAA Computer Networks Conference, April 1973.
Diffie, W. and M. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, November 1976, 644–654.
Evans, A. et. al., A User Authentication Scheme Not Requiring Secrecy in the Computer, CACM Vol. 17 No. 8, August 1977, pp437–441.
Gaines, R. S. private communication, September 1977.
Kent, S. Encryption-based Protection Protocols for Interactive User-Computer Communication, Laboratory for Computer Science, MIT, TR 162, 1976.
National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publication 46, January 1977.
Needham, R. and M. Schroeder, Security and Authentication in Large Networks of Computers, Xerox Palo Alto Research Center Technical Report, September 1977.
Rabin, M. "Digital Signatures Using Conventional Encryption Algorithms, Proceedings of the Conference on Fundamentals of Secure Computing, Atlanta Georgia, October 3–5, 1977 Academic Press (to appear).
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1978 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Popek, G.J., Kline, C.S. (1978). Design issues for secure computer networks. In: Bayer, R., Graham, R.M., Seegmüller, G. (eds) Operating Systems. Lecture Notes in Computer Science, vol 60. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-08755-9_11
Download citation
DOI: https://doi.org/10.1007/3-540-08755-9_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-08755-7
Online ISBN: 978-3-540-35880-0
eBook Packages: Springer Book Archive