[go: up one dir, main page]

Popek et al., 2005 - Google Patents

Design issues for secure computer networks

Popek et al., 2005

Document ID
9634720424420452782
Author
Popek G
Kline C
Publication year
Publication venue
Operating Systems: An Advanced Course

External Links

Snippet

It has long been observed that as the cost per unit of equivalent computation in small machines became far less than large centralized ones, and as the technology of interconnecting machines matured, computing would take on a more and more distributed …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Similar Documents

Publication Publication Date Title
Needham et al. Using encryption for authentication in large networks of computers
Popek et al. Encryption and secure computer networks
US5557765A (en) System and method for data recovery
US6049612A (en) File encryption method and system
US5638448A (en) Network with secure communications sessions
US6272632B1 (en) System and method for controlling access to a user secret using a key recovery field
CN106790250B (en) Data processing, encryption, integrity verification method and identity authentication method and system
JP3193610B2 (en) Communications system
US5666415A (en) Method and apparatus for cryptographic authentication
US5689566A (en) Network with secure communications sessions
EP0511483B1 (en) Method and apparatus for authenticating users of a communication system to each other
US5953424A (en) Cryptographic system and protocol for establishing secure authenticated remote access
JP2637456B2 (en) Message transmission method
US5706347A (en) Method and system for authenticating a computer network node
US20080025514A1 (en) Systems And Methods For Root Certificate Update
US20060195402A1 (en) Secure data transmission using undiscoverable or black data
WO1998047259A9 (en) File encryption method and system
US8683204B2 (en) Efficient techniques for achieving secure transactions using tamper-resistant tokens
JPH07264179A (en) Method for safe communication and safe computation
CN110852745A (en) Block chain distributed dynamic network key automatic updating method
CN114244508A (en) Data encryption method, device, equipment and storage medium
Hoover et al. Software smart cards via cryptographic camouflage
US6396929B1 (en) Apparatus, method, and computer program product for high-availability multi-agent cryptographic key recovery
US6847719B1 (en) Limiting receiver access to secure read-only communications over a network by preventing access to source-formatted plaintext
CN114942729A (en) Data safety storage and reading method for computer system