Date: 1998-07-28 17:01:12Internet standards Internet protocols Public-key cryptography Cryptographic protocols Domain name system Network Time Protocol Domain Name System Security Extensions Man-in-the-middle attack Key management Internet Cryptography Computing | | AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE[removed]A reliable and ubiquitous network time service such as NTP requires some provision to prevAdd to Reading ListSource URL: www.eecis.udel.eduDownload Document from Source Website File Size: 70,85 KBShare Document on Facebook
|