This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
6. References
The Cambridge Distributed Computing System R.M. Needham and A.J. Herbert, Addison-Wesley 1982
Grapevine, an Experiment in Distributed Computing A.D. Birrell, R. Levin, R.M. Needham and M.D. Schroeder CACM 25, 4 April 1982
Cryptography and Data Security D.E.Denning, Addison-Wesley 1982
Using encryption for authentication in large networks of computers R.M. Needham and M.D. Schroeder, CACM 21, 12 Dec. 1978
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1985 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Needham, R.M. (1985). Chapter 8 Protection. In: Hutchison, D., Mariani, J.A., Shepherd, W.D. (eds) Local Area Networks: An Advanced Course. Lecture Notes in Computer Science, vol 184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-15191-5_23
Download citation
DOI: https://doi.org/10.1007/3-540-15191-5_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-15191-3
Online ISBN: 978-3-540-39286-6
eBook Packages: Springer Book Archive