Popek et al., 2005 - Google Patents
Design issues for secure computer networksPopek et al., 2005
- Document ID
- 9634720424420452782
- Author
- Popek G
- Kline C
- Publication year
- Publication venue
- Operating Systems: An Advanced Course
External Links
Snippet
It has long been observed that as the cost per unit of equivalent computation in small machines became far less than large centralized ones, and as the technology of interconnecting machines matured, computing would take on a more and more distributed …
- 238000005516 engineering process 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Needham et al. | Using encryption for authentication in large networks of computers | |
Popek et al. | Encryption and secure computer networks | |
US5557765A (en) | System and method for data recovery | |
US6049612A (en) | File encryption method and system | |
US5638448A (en) | Network with secure communications sessions | |
US6272632B1 (en) | System and method for controlling access to a user secret using a key recovery field | |
CN106790250B (en) | Data processing, encryption, integrity verification method and identity authentication method and system | |
JP3193610B2 (en) | Communications system | |
US5666415A (en) | Method and apparatus for cryptographic authentication | |
US5689566A (en) | Network with secure communications sessions | |
EP0511483B1 (en) | Method and apparatus for authenticating users of a communication system to each other | |
US5953424A (en) | Cryptographic system and protocol for establishing secure authenticated remote access | |
JP2637456B2 (en) | Message transmission method | |
US5706347A (en) | Method and system for authenticating a computer network node | |
US20080025514A1 (en) | Systems And Methods For Root Certificate Update | |
US20060195402A1 (en) | Secure data transmission using undiscoverable or black data | |
WO1998047259A9 (en) | File encryption method and system | |
US8683204B2 (en) | Efficient techniques for achieving secure transactions using tamper-resistant tokens | |
JPH07264179A (en) | Method for safe communication and safe computation | |
CN110852745A (en) | Block chain distributed dynamic network key automatic updating method | |
CN114244508A (en) | Data encryption method, device, equipment and storage medium | |
Hoover et al. | Software smart cards via cryptographic camouflage | |
US6396929B1 (en) | Apparatus, method, and computer program product for high-availability multi-agent cryptographic key recovery | |
US6847719B1 (en) | Limiting receiver access to secure read-only communications over a network by preventing access to source-formatted plaintext | |
CN114942729A (en) | Data safety storage and reading method for computer system |