Using Encryption for Authentication in Large Networks of Computers

1.5kCitations
Citations of this article
346Readers
Mendeley users who have this article in their library.

Abstract

Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols. © 1978, ACM. All rights reserved.

Cite

CITATION STYLE

APA

Needham, R. M., & Schroeder, M. D. (1978). Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12), 993–999. https://doi.org/10.1145/359657.359659

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free