Publication:
A Technique for Remote Authentication

dc.contributor.authorOliver, Katie
dc.contributor.authorYasinsac, Alec
dc.contributor.authorWulf, William
dc.contributor.authorPeri, Ramesh
dc.date.accessioned2026-01-22T19:24:03Z
dc.date.issued1993-01-01
dc.descriptionOriginal submission date: 2013-10-10T19:53:41Z
dc.description.abstractDistributed systems have long relied on shared secrets to ensure the authenticity of principals. Public key systems and zero knowledge proofs of identity have reduced this reliance. We offer a method of remote authentication that can be used with no advance shared knowledge by parties, and that allows parties to increase their confidence in the authenticity of a suspicious party to an arbitrary level. Note: Abstract extracted from PDF text
dc.identifierk3569436w
dc.identifier.citationWulf, William, Alec Yasinsac, Katie Oliver, and Ramesh Peri. "A Technique for Remote Authentication." University of Virginia Dept. of Computer Science Tech Report (1993).
dc.identifier.doi10.18130/V3SJ4G
dc.identifier.urihttps://doi.org/10.18130/V3SJ4G
dc.identifier.urihttps://libraopen.library.virginia.edu/handle/item/8504
dc.languageEnglish
dc.language.isoen
dc.publisherUniversity of Virginia, Department of Computer Science
dc.rightsAll rights reserved (no additional license for public reuse)
dc.titleA Technique for Remote Authentication
dc.typeTechnical Report
dspace.entity.typePublication
relation.isAuthorOfPublication6070158a-dfbf-4647-b809-11325d660105
relation.isAuthorOfPublication6d1c529d-0a15-42d3-b73c-a8df4f6a1960
relation.isAuthorOfPublication70f3cc39-0ece-4c5f-8e2c-5f108a5950c1
relation.isAuthorOfPublicatione5925518-ff5a-4987-8a4c-06e7f770c554
relation.isAuthorOfPublication.latestForDiscovery6070158a-dfbf-4647-b809-11325d660105

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
CS-93-37.pdf
Size:
20.81 KB
Format:
Adobe Portable Document Format

Collections