메뉴 건너뛰기




Volumn 2874, Issue , 2003, Pages 192-202

Facets of security

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 0348216661     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40042-4_6     Document Type: Article
Times cited : (8)

References (28)
  • 12
    • 33744918476 scopus 로고    scopus 로고
    • Analysing security protocols
    • A. Abdallah, editor, formal Aspects of Security, Springer Verlag, to appear
    • Dieter Gollmann. Analysing security protocols. In A. Abdallah, editor, formal Aspects of Security, LNCS 2629. Springer Verlag, to appear.
    • LNCS , vol.2629
    • Gollmann, D.1
  • 18
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • November
    • Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
    • (1992) ACM Transactions on Computer Systems , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 19
    • 84958752287 scopus 로고    scopus 로고
    • Towards a survivable security architecture for ad-hoc networks
    • B. Christiansen et al., editor, Security Protocols, 9th International Workshop, Cambridge, Springer Verlag
    • Silja Mäki and Tuomas Aura. Towards a survivable security architecture for ad-hoc networks. In B. Christiansen et al., editor, Security Protocols, 9th International Workshop, Cambridge, LNCS 2467, pages 63-73. Springer Verlag, 2002.
    • (2002) LNCS , vol.2467 , pp. 63-73
    • Mäki, S.1    Aura, T.2
  • 22
    • 84947242748 scopus 로고    scopus 로고
    • Keynote address: The changing environment (transcript of discussion)
    • B. Christiansen et al., editor, Security Protocols, 7th International Workshop, Cambridge, Springer Verlag
    • Roger Needham. Keynote address: The changing environment (transcript of discussion). In B. Christiansen et al., editor, Security Protocols, 7th International Workshop, Cambridge, LNCS 1796, pages 1-5. Springer Verlag, 2000.
    • (2000) LNCS , vol.1796 , pp. 1-5
    • Needham, R.1
  • 24
    • 84944062148 scopus 로고    scopus 로고
    • How much details and negotiations can users handle?
    • F. Cuppens et al., editor, ESORICS 2000, Springer Verlag
    • Kai Rannenberg. How much details and negotiations can users handle? In F. Cuppens et al., editor, ESORICS 2000, LNCS 1895, pages 37-54. Springer Verlag, 2000.
    • (2000) LNCS , vol.1895 , pp. 37-54
    • Rannenberg, K.1
  • 25
    • 1942433797 scopus 로고    scopus 로고
    • DRM {and, or, vs.} the Law
    • April
    • Pamela Samuelson. DRM {and, or, vs.} the Law. Communications of the ACM, 46(4):41-45, April 2003.
    • (2003) Communications of the ACM , vol.46 , Issue.4 , pp. 41-45
    • Samuelson, P.1
  • 28
    • 0032669524 scopus 로고    scopus 로고
    • Fixing a security flaw in IKE protocols
    • June
    • Jianying Zhou. Fixing a security flaw in IKE protocols. Electronics Letters, 35(13):1072-1073, June 1999.
    • (1999) Electronics Letters , vol.35 , Issue.13 , pp. 1072-1073
    • Zhou, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.