Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Internet Privacy Enhanced Mail
Communications of the ACM - Special issue on internetworking
The Data Encryption Standard (DES) and its strength against attacks
IBM Journal of Research and Development
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
Digital signatures and their uses
Computers and Security
Using encryption for authentication in large networks of computers
Communications of the ACM
Hi-index | 0.00 |
The paper surveys the authentication services used by modern computer systems and presents the major operational authentication services employed by commercial companies, banking as well as government departments. As distributed system services are susceptible to a variety of threats mounted by intruders as well as legitimate users of the system, password-based authentication is not suitable for use on computer networks.