Publication: A Technique for Remote Authentication
| dc.contributor.author | Oliver, Katie | |
| dc.contributor.author | Yasinsac, Alec | |
| dc.contributor.author | Wulf, William | |
| dc.contributor.author | Peri, Ramesh | |
| dc.date.accessioned | 2026-01-22T19:24:03Z | |
| dc.date.issued | 1993-01-01 | |
| dc.description | Original submission date: 2013-10-10T19:53:41Z | |
| dc.description.abstract | Distributed systems have long relied on shared secrets to ensure the authenticity of principals. Public key systems and zero knowledge proofs of identity have reduced this reliance. We offer a method of remote authentication that can be used with no advance shared knowledge by parties, and that allows parties to increase their confidence in the authenticity of a suspicious party to an arbitrary level. Note: Abstract extracted from PDF text | |
| dc.identifier | k3569436w | |
| dc.identifier.citation | Wulf, William, Alec Yasinsac, Katie Oliver, and Ramesh Peri. "A Technique for Remote Authentication." University of Virginia Dept. of Computer Science Tech Report (1993). | |
| dc.identifier.doi | 10.18130/V3SJ4G | |
| dc.identifier.uri | https://doi.org/10.18130/V3SJ4G | |
| dc.identifier.uri | https://libraopen.library.virginia.edu/handle/item/8504 | |
| dc.language | English | |
| dc.language.iso | en | |
| dc.publisher | University of Virginia, Department of Computer Science | |
| dc.rights | All rights reserved (no additional license for public reuse) | |
| dc.title | A Technique for Remote Authentication | |
| dc.type | Technical Report | |
| dspace.entity.type | Publication | |
| relation.isAuthorOfPublication | 6070158a-dfbf-4647-b809-11325d660105 | |
| relation.isAuthorOfPublication | 6d1c529d-0a15-42d3-b73c-a8df4f6a1960 | |
| relation.isAuthorOfPublication | 70f3cc39-0ece-4c5f-8e2c-5f108a5950c1 | |
| relation.isAuthorOfPublication | e5925518-ff5a-4987-8a4c-06e7f770c554 | |
| relation.isAuthorOfPublication.latestForDiscovery | 6070158a-dfbf-4647-b809-11325d660105 |
Files
Original bundle
1 - 1 of 1