A key distribution protocol using event markers

作者: R. K. Bauer , T. A. Berson , R. J. Feiertag

DOI: 10.1145/357369.357373

关键词: Authentication protocolComputer scienceComputer networkOtway–Rees protocolComputational biologyCryptographic protocolLayer 2 Tunneling ProtocolEvent (probability theory)Off-the-Record MessagingThree-pass protocolKey distribution

摘要:

参考文章(6)
Gerald J. Popek, Charles S. Kline, Encryption and Secure Computer Networks ACM Computing Surveys. ,vol. 11, pp. 331- 356 ,(1979) , 10.1145/356789.356794
Dorothy E. Denning, Giovanni Maria Sacco, Timestamps in key distribution protocols Communications of The ACM. ,vol. 24, pp. 533- 536 ,(1981) , 10.1145/358722.358740
M. Pease, R. Shostak, L. Lamport, Reaching Agreement in the Presence of Faults Journal of the ACM. ,vol. 27, pp. 228- 234 ,(1980) , 10.1145/322186.322188
Roger M. Needham, Michael D. Schroeder, Using encryption for authentication in large networks of computers Communications of the ACM. ,vol. 21, pp. 993- 999 ,(1978) , 10.1145/359657.359659
Leslie Lamport, Robert Shostak, Marshall Pease, The Byzantine Generals Problem ACM Transactions on Programming Languages and Systems. ,vol. 4, pp. 382- 401 ,(1982) , 10.1145/357172.357176
Leslie Lamport, Time, clocks, and the ordering of events in a distributed system Communications of the ACM. ,vol. 21, pp. 558- 565 ,(1978) , 10.1145/359545.359563