Author:
Coomaraswamy Gnanesh,Kumar Srikanta P. R.
Reference14 articles.
1. F. Bauspieß and H. Knobloch, “How to Keep Authenticity Alive in a Computer Network,” Proc. EUROCRYPT’89, Lecture Notes in Computer Science, Springer Verlag, 1989, pp. 38-46.
2. W. Diffie and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. Info. Theory, Vol. IT-22, No.6, Nov. 1976, pp.644–654
3. Proposed EIA/TIA IS41 Standard, Document PN2078, July 1991.
4. G. Coomaraswamy, “Security Issues in Broadcast Fiber Optic and Digital Radio Networks,” Ph.D. Dissertation, Northwestern University, Evanston, Dec. 1992.
5. R. M. Needham and M. D. Schroeder, “Using Encryption for Authentication in Large Networks of Computers,” Comm. ACM., Dec. 1978, Vol. 21, No.2, pp.993–999.