Show simple item record

dc.contributor.authorAlpern, Bowenen_US
dc.contributor.authorSchneider, Fred B.en_US
dc.date.accessioned2007-04-23T16:45:12Z
dc.date.available2007-04-23T16:45:12Z
dc.date.issued1982-08en_US
dc.identifier.citationhttp://techreports.library.cornell.edu:8081/Dienst/UI/1.0/Display/cul.cs/TR82-513en_US
dc.identifier.urihttps://hdl.handle.net/1813/6353
dc.description.abstractProtocols to generate and distribute secret keys in a computer network are described. They are based on keyless cryptography, a new cryptographic technique where information is hidden by keeping only the originator of a message, and not its contents, secret.en_US
dc.format.extent309611 bytes
dc.format.extent109381 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/postscript
dc.language.isoen_USen_US
dc.publisherCornell Universityen_US
dc.subjectcomputer scienceen_US
dc.subjecttechnical reporten_US
dc.titleKey Exchange Using Keyless Cryptographyen_US
dc.typetechnical reporten_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Statistics