References
Menezes, A., P. van Oorschot, and S. Vanstone (1997). Handbook of Applied Cryptography. CRC Press, Boca Raton, FL.
Needham, R.M. and M.D. Schroeder (1978). “Using encryption for authentication in large networks of computers.” Communications of the ACM, 21, 993–999.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
Just, M. (2005). Needham–Schroeder Protocols. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_270
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_270
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering