메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 130-139

Secure Web services for low-cost devices

Author keywords

[No Author keywords available]

Indexed keywords

LIMITED ENERGY; LOW-COST DEVICES; SECURE WEB SERVICES; XML WEB SERVICES;

EID: 33744483089     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISORC.2005.50     Document Type: Conference Paper
Times cited : (10)

References (22)
  • 1
    • 0003969638 scopus 로고
    • 26 December (Supersedes CSC-STD-001-83, dtd 15 Aug 83). (Orange Book)
    • DoD Trusted Computer System Evaluation Criteria, 26 December 1985 (Supersedes CSC-STD-001-83, dtd 15 Aug 83). (Orange Book)
    • (1985) DoD Trusted Computer System Evaluation Criteria
  • 3
    • 33744464814 scopus 로고
    • PGP user's guide
    • Cambridge
    • P. Zimmermann, "PGP User's Guide," MIT Press, Cambridge, 1994.
    • (1994) MIT Press
    • Zimmermann, P.1
  • 8
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Springer-Verlag
    • F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," LNCS 1796, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1796
    • Stajano, F.1    Anderson, R.2
  • 9
    • 84969340391 scopus 로고
    • Key distribution protocol for digital mobile communication systems
    • Lecture Notes in Computer Science
    • M. Tatebayashi, N. Matsuzaki, and D. B. J. Newman, "Key distribution protocol for digital mobile communication systems," in Advances in Cryptology-Crypto '89 Proceedings, Lecture Notes in Computer Science, vol. 435, 1989, pp. 324-334.
    • (1989) Advances in Cryptology-crypto '89 Proceedings , vol.435 , pp. 324-334
    • Tatebayashi, M.1    Matsuzaki, N.2    Newman, D.B.J.3
  • 10
    • 0028532997 scopus 로고
    • Cryptanalysis and protocol failure
    • Nov
    • G. J. Simmons, "Cryptanalysis and protocol failure," Communications of the ACM, 37(11), Nov 1994.
    • (1994) Communications of the ACM , vol.37 , Issue.11
    • Simmons, G.J.1
  • 11
    • 84969354234 scopus 로고
    • On key distribution and authentication in mobile radio networks
    • Lecture Notes in Computer Science
    • C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii, "On key distribution and authentication in mobile radio networks," in Advances in Cryptology EuroCrypt '93, Lecture Notes in Computer Science, vol. 765, pp. 461-465, 1993.
    • (1993) Advances in Cryptology EuroCrypt '93 , vol.765 , pp. 461-465
    • Park, C.1    Kurosawa, K.2    Okamoto, T.3    Tsujii, S.4
  • 13
    • 0027589399 scopus 로고
    • Fully-fledged two-way public key authentication and key agreement for low-cost terminals
    • May 27
    • M. J. Beller and Y. Yacobi, "Fully-Fledged Two-Way Public Key Authentication and Key Agreement for Low-Cost Terminals," Proceedings of Electronic Letters, May 27, 1993, Vol. 29, No. 11, pp. 999-1000.
    • (1993) Proceedings of Electronic Letters , vol.29 , Issue.11 , pp. 999-1000
    • Beller, M.J.1    Yacobi, Y.2
  • 14
    • 84956854891 scopus 로고    scopus 로고
    • Key establishment protocols for secure mobile communications: A selective survey
    • Proceedings of ACISP'98
    • C. Boyd and A. Mathuria, "Key establishment protocols for secure mobile communications: A selective survey," in Proceedings of ACISP'98, Lecture Notes in Computer Science, vol. 1438, 1998, pp. 344-355.
    • (1998) Lecture Notes in Computer Science , vol.1438 , pp. 344-355
    • Boyd, C.1    Mathuria, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.