Network Security via Private-Key Certificates.
Don DavisRalph R. SwickPublished in: ACM SIGOPS Oper. Syst. Rev. (1990)
Keyphrases
- network security
- public key
- private key
- intrusion detection
- computer networks
- security analysis
- signature scheme
- traffic analysis
- digital signature
- intrusion detection system
- information security
- secret key
- security policies
- anomaly detection
- network traffic
- authentication protocol
- encryption scheme
- database
- peer to peer