Encryption and Secure Computer Networks

80Citations
Citations of this article
41Readers
Mendeley users who have this article in their library.

Abstract

There is increasing growth in the number of computer networks in use and in the kinds of distributed computing applications available on these networks This increase, together with concern about privacy, security, and integrity of information exchange, has created considerable interest in the use of encryptlon to protect information in the networks This survey is directed at the reader who ts knowledgeable about varmus network designs and who now wishes to consider incorporating encryption methods into these designs. It is also directed at developers of encryption algorithms who wish to understand the characteristics of such algorithms useful in network applications. Key management, network encryption protocols, digital signatures, and the utility of conventional- or public-key encryptlon methods are each discussed. A case study of how encryption was integrated into an actual network, the Arpanet, illustrates many issues present m the design of a network encryption facdity. © 1979, ACM. All rights reserved.

Cite

CITATION STYLE

APA

Popek, G. J., & Kline, C. S. (1979). Encryption and Secure Computer Networks. ACM Computing Surveys (CSUR), 11(4), 331–356. https://doi.org/10.1145/356789.356794

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free