A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Secure communications over insecure channels
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
A note on the confinement problem
Communications of the ACM
Design Issues for Secure Computer Networks
Operating Systems, An Advanced Course
ACM SIGOPS Operating Systems Review
Measurements of sharing in Multics
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
ACM Computing Surveys (CSUR)
Timestamps in key distribution protocols
Communications of the ACM
Technical correspondence: on secure personal computing
Communications of the ACM
Electronic funds transfer networks: The impact of performance and security considerations
ANSS '80 Proceedings of the 13th annual symposium on Simulation
The implementation of a cryptography-based secure office system
AFIPS '82 Proceedings of the June 7-10, 1982, national computer conference
Hi-index | 48.25 |
A method for implementing secure personal computing in a network with one or more central facilities is proposed. The method employs a public-key encryption device and hardware keys. Each user is responsible for his own security and need not rely on the security of the central facility or the communication links. A user can safely store confidential files in the central facility or transmit confidential data to other users on the network.