Last update: Sun Jul 30 02:10:15 MDT 2017
@Article{Kohl:1990:UEK, author = "John T. Kohl", title = "The Use of Encryption in {Kerberos} for Network Authentication (Invited)", journal = j-LECT-NOTES-COMP-SCI, volume = "435", pages = "35--??", year = "1990", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Feb 4 12:01:59 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm; http://www.math.utah.edu/pub/tex/bib/lncs1990.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0435/04350035.htm; http://link.springer-ny.com/link/service/series/0558/papers/0435/04350035.pdf", acknowledgement = ack-nhfb, }