07.07.2023 Views

Implementing-cryptography-using-python

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 2 ■ Cryptographic Protocols and Perfect Secrecy 63

J. Kohl, C. Neuman, T. T’so. “The Evolution of the Kerberos Authentication

System.” In Distributed Open Systems, pp. 78–94. IEEE Computer Society

Press, 1994.

R. Needham, M. Schroeder. “Using Encryption for Authentication in Large

Networks of Computers.” Communications of the ACM, Vol. 21, No. 12,

1978.

R. Needham, M. Schroeder. “Authentication Revisited.” Operating Systems

Review, Vol. 21, No. 1, 1987.

D. Otway, R. Rees. “Efficient and Timely Mutual Authentication.” ACM

SIGOPS Operating Systems Review, Vol. 21, No. 1, 1987.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!