|
Volumn 1, Issue 3, 2005, Pages 166-167
|
On the Authentication of the User from the Remote Autonomous Object
|
Author keywords
Authentication; Cryptography; Man in middle attack; Reflection attack; Rsa
|
Indexed keywords
AUTONOMOUS OBJECTS;
MAN-IN-MIDDLE ATTACKS;
REFLECTION ATTACKS;
RSA;
CRYPTOGRAPHY;
NETWORK SECURITY;
SAFETY ENGINEERING;
AUTHENTICATION;
|
EID: 33646246270
PISSN: 1816353X
EISSN: 18163548
Source Type: Journal
DOI: None Document Type: Article |
Times cited : (8)
|
References (2)
|