Re: Protocol Benchmarking (with Accept examples - long)

Larry Masinter (
Wed, 2 Feb 1994 18:06:36 PST

While we're optimizing things, how about looking at the exchanges
necessary for an authenticated call. Right now, access control adds a
lot of exchanges. Couldn't you somehow send your credentials (oh, who
you are, with the time and the host ID of yourself and the destination
host signed with your private key) to the remote host in the initial