First Page | Meta Content | |
---|---|---|
Document Date: 2004-11-17 13:32:23Open Document File Size: 62,93 KBShare Result on FacebookCityDallas / /CompanySIAM Journal / Needham / C0 / /Currencypence / USD / / /FacilityNational Institute of Standards and Technology / Kerberos Version 4∗ Tom Yu Sam Hartman Kenneth Raeburn Massachusetts Institute of Technology Abstract Version / terminal NUL / Key Distribution Center / Massachusetts Institute of Technology / /IndustryTermauthentication protocol / level network protocols / authentication infrastructure / Internet Draft / large networks / Internet RFC / Internet Request / conceptual services / binary packet protocol / hypothetical banking protocol / symmetric-key protocol / cryptographic protocols / secure protocol / bank / authentication network / Security protocols / open network systems / /OperatingSystemUNIX / /OrganizationRoyal Society of London / Institute of Technology Abstract Version / U.S. Department of Commerce / Massachusetts Institute of Technology / Key Distribution Center / National Institute of Standards and Technology / Internet Engineering Task Force / /PersonT. Yu / Amy Yu / S. Hartman / D. Schroeder / J. I. Schiller / K. Raeburn / Ted Ts / Perry Metzger / Steve Bellovin / Andrew File / Jeff Schiller / Jeff Hutzelman / J. Kohl / C. Neuman / Mark Eichin / Steve Dorner / Matt Blaze / J. G. Steiner / /Positionadministrator / /ProvinceOrStateTexas / Massachusetts / /PublishedMediumIEEE Transactions on Software Engineering / SIAM Journal on Computing / Proceedings of the Royal Society / Communications of the ACM / /Technologyhigh-level network protocols / symmetric-key protocol / UNIX / hypothetical banking protocol / block cipher / key distribution protocols / Security protocols / Kerberos protocol / SSH protocol / Secure Shell / trusted-third-party authentication protocol / SSL / well-designed protocol / Encryption / cryptography / updated protocol / AFS protocol / Kerberos encryption / 4 uses unauthenticated encryption / ASCII / SSH binary packet protocol / Using encryption / Kerberos authentication protocol / IP security protocols / AES encryption / unauthenticated encryption / 5 protocol / /URLhttp /SocialTag |