References |
|
N |
|
Previous| |
Next |
Needham, R. (1993). Cryptography and secure channels. In Mullender, S., editor,
Distributed Systems, 2nd Edition, ACM-Press, chapter 20. Addison-Wesley. Needham, R. and Schroeder, M. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999. Needham, R. and Schroeder, M. (1987). Authentication revisited. Operating Systems Review, 21(1):7. Neuman, B. and Stubblebine, S. (1993). A note on the use of timestamps as nonces. Operating Systems Review, 27(2):10-14. Neuman, B. and Ts'o, T. (1994). Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9):33-38. Neumann, P. (1995). Computer Related Risks. Addison-Wesley. Neves, N. and Fuchs, W. (1998). RENEW: A tool for fast and efficient implementation of checkpointing protocols. In Digest of Papers, The 28th IEEE Int'l Symp. on Fault-Tolerant Computing Systems, Munich, Germany. Nicomette, V. and Deswarte, Y. (1997). An authorization scheme for distributed object systems. In Proc. of the IEEE Symp. on Security and Privacy, pages 21-30. Norton, B. (1994). Integrating network discovery with network monitoring: The nsfnet method. In Proceedings of the INET'94/JENC5, page 5631 to 5636.
|
|
Previous| |
Next |