XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Standardization

Articles & Features

Cellular networks

By Lourens O. Walters, P. S. Kritzinger, December 2000

PDF | HTML | In the Digital Library

Mobile IP

By Debalina Ghosh, December 2000

PDF | HTML | In the Digital Library

Service discovery in the future for mobile commerce

By Dipanjan Chakraborty, Harry Chen, December 2000

PDF | HTML | In the Digital Library

Introduction to Linux networking and security

By Wei-Mei Shyr, Brian Borowski, September 1999

PDF | HTML | In the Digital Library

Electronic voting

By Lorrie Faith Cranor, April 1996

PDF | HTML | In the Digital Library

Mutual authenticating protocol with key distribution in client/server environment

The explosive growth of networked and internetworked computer systems during the past decade has brought about a need for increased protection mechanisms. This paper discusses three authentication protocols that incorporate the use of methods that present effective user authentication. The first two protocols have been previously discussed in the literature; the third protocol draws from the first two and others to produce an authentication scheme that provides both mutual authentication and secure key distribution which is easy to use, is compatible with present operating systems, is transparent across systems, and provides password file protection.

By Charles Cavaiani, Jim Alves-Foss, April 1996

PDF | HTML | In the Digital Library

The Fox Project

By Jeremy Buhler, September 1995

PDF | HTML | In the Digital Library

There can be only one

By Vernard Martin, February 1995

PDF | HTML | In the Digital Library

In search of a customizable and uniform user interface

By Bradley M. Kuhn, David W. Binkley, December 1994

PDF | HTML | In the Digital Library

Information superwhichway?

By Craig Pfeifer, September 1994

PDF | HTML | In the Digital Library