Ethernet: distributed packet switching for local computer networks
Communications of the ACM
INTRODUCTION TO MULTICS
ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION
ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Using encryption for authentication in large networks of computers
Communications of the ACM
Using signal processing to analyze wireless data traffic
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Adding capability access to conventional file servers
ACM SIGOPS Operating Systems Review
Injective synchronisation: an extension of the authentication hierarchy
Theoretical Computer Science - Automated reasoning for security protocol analysis
Hi-index | 0.02 |
This paper develops a virtual connection model, complete with intruder, for interactive terminal-host communication and presents a set of protection goals that characterize the security that can be provided for a physically unsecured connection. Fundamental requirements for protocols that achieve these goals and the role of encryption in the design of such protocols are examined. Functional and security constraints on positioning of protection protocols in a communication system and the impact of positioning on the design of secure operating systems are discussed.