ThesaHelp: references p-r
Topic: key distribution
| |
Reference
Rubin, A.D.,
"Kerberos versus the Leighton-Micali protocol",
Dr. Dobb's Journal, November 2000, pp. 21-26.
Google
Quotations
21 ;;Quote: use a central, trusted authority to distribute session keys, a large random number used as a symmetric key
| 22 ;;Quote: Kerberos uses the Needham Schroeder protocol to establish a session key
| 24 ;;Quote: the Leighton-Micali protocol for session keys separates confidentiality from authentication; elegant, efficient, and secure
|
Related Topics
ThesaHelp: references p-r (245 items)
Topic: key distribution (33 items)
|