메뉴 건너뛰기




Volumn 2, Issue 2, 1997, Pages 25-32

Authentication using cryptography

(1)  Mitchell, Chris a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0041632328     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1363-4127(97)81326-X     Document Type: Note
Times cited : (1)

References (7)
  • 2
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder, "Using encryption for authentication in large networks of computers". Communications of the ACM, 21 (1978) pp. 993-999.
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 4
    • 0024715186 scopus 로고
    • Limitations of challenge-response entity authentication
    • C.J. Mitchell, "Limitations of challenge-response entity authentication". Electronics Letters, 25 (1989) 1195-1196.
    • (1989) Electronics Letters , vol.25 , pp. 1195-1196
    • Mitchell, C.J.1
  • 5
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • L. Lamport, "Time, clocks, and the ordering of events in a distributed system". Communications of the ACM, 21 (1978) pp. 558-565.
    • (1978) Communications of the ACM , vol.21 , pp. 558-565
    • Lamport, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.