Key points are not available for this paper at this time.
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.
Building similarity graph...
Analyzing shared references across papers
Loading...
Needham et al. (Fri,) studied this question.
www.synapsesocial.com/papers/69dcc9305f911386753594ba — DOI: https://doi.org/10.1145/359657.359659
Roger M. Needham
Michael Schroeder
Communications of the ACM
Palo Alto Research Center
Building similarity graph...
Analyzing shared references across papers
Loading...