메뉴 건너뛰기




Volumn 15, Issue 8, 1996, Pages 661-671

Plugging the holes in host-based authentication

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; CRYPTOGRAPHY; INTERFACES (COMPUTER); NETWORK PROTOCOLS;

EID: 0030378565     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(97)89699-X     Document Type: Article
Times cited : (3)

References (27)
  • 4
    • 0029481623 scopus 로고
    • Open systems security: Traps and pitfalls
    • Elsevier, Sept
    • J. Reid, "Open Systems Security: Traps and Pitfalls," Proc. Computers and Security, Elsevier, (Sept 1995).
    • (1995) Proc. Computers and Security
    • Reid, J.1
  • 11
    • 85029995936 scopus 로고
    • Computer Emergency Response Team Jan
    • anon, CERTAdvisory CA-95.01, Computer Emergency Response Team (Jan 1995).
    • (1995) CERTAdvisory CA-95.01
  • 16
    • 85029979094 scopus 로고    scopus 로고
    • Computer Emergency Response Team Feb
    • anon, CERTAdvisory CA-96.03, Computer Emergency Response Team (Feb 1996).
    • (1996) CERTAdvisory CA-96.03
  • 18
    • 0028532579 scopus 로고
    • Vhy cryptosystems fail
    • Nov
    • R. J. Anderson, "Vhy Cryptosystems Fail," Comm. ACM 37(11) pp. 32-40 (Nov 1994).
    • (1994) Comm. ACM , vol.37 , Issue.11 , pp. 32-40
    • Anderson, R.J.1
  • 23
    • 85084164692 scopus 로고    scopus 로고
    • SSH - Secure login connections over the internet
    • July
    • T. Ylonen, "SSH - Secure Login Connections over the Internet," Proc. Sixth USENIX Unix Security Symposium, PP. 37-42 (July 1996).
    • (1996) Proc. Sixth USENIX Unix Security Symposium , pp. 37-42
    • Ylonen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.