References

N

Previous |

Next

Needham, R. (1993). Cryptography and secure channels. In Mullender, S., editor, Distributed Systems, 2nd Edition, ACM-Press, chapter 20. Addison-Wesley.

Needham, R. and Schroeder, M. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999.

Needham, R. and Schroeder, M. (1987). Authentication revisited. Operating Systems Review, 21(1):7.

Neuman, B. and Stubblebine, S. (1993). A note on the use of timestamps as nonces. Operating Systems Review, 27(2):10-14.

Neuman, B. and Ts'o, T. (1994). Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9):33-38.

Neumann, P. (1995). Computer Related Risks. Addison-Wesley.

Neves, N. and Fuchs, W. (1998). RENEW: A tool for fast and efficient implementation of checkpointing protocols. In Digest of Papers, The 28th IEEE Int'l Symp. on Fault-Tolerant Computing Systems, Munich, Germany.

Nicomette, V. and Deswarte, Y. (1997). An authorization scheme for distributed object systems. In Proc. of the IEEE Symp. on Security and Privacy, pages 21-30.

Norton, B. (1994). Integrating network discovery with network monitoring: The nsfnet method. In Proceedings of the INET'94/JENC5, page 5631 to 5636.

Previous |

Next