Map
Index
Random
Help
th

Quote: a security system must assume that the network is controlled by an adversary; a modified Kerberos can meet this goal

topics > all references > references a-b > QuoteRef: bellSM10_1990 , p. 120



Topic:
authentication

Quotation Skeleton

For the widest utility, the network must be … [secure, communication] protocols should be secure even if the network is under … to invert the encryption algorithm or to subvert … expense of encryption. (No "steel doors in paper …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: authentication (87 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.