Warning:
JavaScript is turned OFF. None of the links on this page will work until it is reactivated.
If you need help turning JavaScript On, click here.
The Concept Map you are trying to access has information related to:
Chapter 7 Case, Case Study: Needham, Schroeder In early distributed systems (1974-84) it was difficult to protect the servers Against masquerading attacks on a file server. Because there was no mechanism for authenticating the origins of request. Public-key cryptography was not yet available or practical, Case Study: Needham, Schroeder Needham and Schroeder therefore developed an authertication and key- distribution protocol for use in a local network An early example of the care required to design a safe security protocol. Introduced several design ideas including the use