Using Encryption for Authentication in Large Networks of Computers

@article{Needham1978UsingEF,
  title={Using Encryption for Authentication in Large Networks of Computers},
  author={Roger M. Needham and Michael D. Schroeder},
  journal={Commun. ACM},
  year={1978},
  volume={21},
  pages={993-999}
}
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols. 
Highly Influential
This paper has highly influenced 155 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 2,413 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 1,443 extracted citations

2,414 Citations

050100150'79'89'00'11
Citations per Year
Semantic Scholar estimates that this publication has 2,414 citations based on the available data.

See our FAQ for additional information.

Similar Papers

Loading similar papers…