메뉴 건너뛰기




Volumn 2, Issue 3, 1997, Pages 227-241

Extending NCP for protocols using public keys

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; MOBILE TELECOMMUNICATION SYSTEMS; SECURITY OF DATA; TELECOMMUNICATION LINKS;

EID: 0031386327     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1013636817876     Document Type: Article
Times cited : (7)

References (12)
  • 3
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • August
    • D.E. Denning and G.M. Sacco, Timestamps in key distribution protocols, Communications of the ACM 24(8) (August 1981) 533-536.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 7
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R.M. Needham and M.D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21(12) (December 1978) 993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 8
    • 0025405980 scopus 로고
    • A critique of the Burrows, Abadi and Needham logic
    • April
    • D.M. Nessett, A critique of the Burrows, Abadi and Needham logic, Operating System Review 24(2) (April 1990) 35-38.
    • (1990) Operating System Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.