1. {1} This use of private-key certificates was proposed to us by Martin Abadi and Mike Burrows of Digital's Systems Research Center and by Butler Lampson of Digital's Cambridge Research Laboratory in a personal communication. {1} This use of private-key certificates was proposed to us by Martin Abadi and Mike Burrows of Digital's Systems Research Center and by Butler Lampson of Digital's Cambridge Research Laboratory in a personal communication.
2. Digital signatures: A tutorial survey
3. A logic of authentication
4. {4} Don Davis and Ralph Swick "Kerberos Authentication and Workstation Services at Project Athena " MIT Laboratory for Computer Science Technical Memorandum 424 (Feb. 1990). {4} Don Davis and Ralph Swick "Kerberos Authentication and Workstation Services at Project Athena " MIT Laboratory for Computer Science Technical Memorandum 424 (Feb. 1990).
5. {5} Dorothy E. R. Denning Cryptography and Data Security. Reading MA: Addison-Wesley 1983. pp. 14-15. {5} Dorothy E. R. Denning Cryptography and Data Security . Reading MA: Addison-Wesley 1983. pp. 14-15.