authentication without public keys
Peter Rowell
peter at thirdi.UUCP
Mon Nov 21 08:57:42 AEST 1988
For those interested in a paper on the subject, I heartily
recommend the following:
Communications of the ACM
December, 1978
Volume 21, Number 12
Pages 993-999
"Using Encryption for Authentication
in Large Networks of Computers."
Roger M. Needham and (Now at Cambridge (?))
Michael D. Schroeder (Now at DEC (?))
Xerox PARC
The paper is clear and succinct. It discusses the establishment
of secure communications using either public key or private key
methods.
----------------------------------------------------------------------
Peter Rowell
Third Eye Software, Inc. (415) 321-0967
Menlo Park, CA 94025 peter at thirdi.UUCP
More information about the Comp.unix.wizards
mailing list