Kaijser et al., 1994
| Publication | Publication Date | Title |
|---|---|---|
| Kaijser et al. | SESAME: The solution to security for open distributed systems | |
| Shirey | Internet security glossary | |
| US6446206B1 (en) | Method and system for access control of a message queue | |
| US7624269B2 (en) | Secure messaging system with derived keys | |
| US6148404A (en) | Authentication system using authentication information valid one-time | |
| US7085931B1 (en) | Virtual smart card system and method | |
| Sollins | Cascaded authentication. | |
| US8909555B2 (en) | Information security system | |
| CN107026824B (en) | A kind of message encryption, decryption method and device | |
| US20050289085A1 (en) | Secure domain network | |
| US20010020228A1 (en) | Umethod, system and program for managing relationships among entities to exchange encryption keys for use in providing access and authorization to resources | |
| US20030217148A1 (en) | Method and apparatus for LAN authentication on switch | |
| JP2004509399A (en) | System for protecting objects distributed over a network | |
| JPH07325785A (en) | Network user authentication method, encrypted communication method, application client and server | |
| Mullender et al. | Protection and resource control in distributed operating systems | |
| Gollmann et al. | Authentication services in distributed systems | |
| Molva et al. | Authentication method with impersonal token cards | |
| Muftic et al. | Security architecture for distributed systems | |
| Low et al. | Self authenticating proxies | |
| Varadharajan | Distributed object systems security | |
| Hoyle et al. | On solutions to the key escrow problem | |
| Osório et al. | The PRODNET communication infrastructure | |
| Louwrens | Single sign-on in heterogeneous computer environments | |
| Buffenoir | Security in the OSI model | |
| Kaplan et al. | Implementing Kerberos in Distributed Systems |