메뉴 건너뛰기




Volumn 3809 LNAI, Issue , 2005, Pages 245-253

Analyzing security protocols using association rule mining

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; CORRELATION METHODS; DATA MINING; NETWORK PROTOCOLS;

EID: 33745614656     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11589990_27     Document Type: Conference Paper
Times cited : (3)

References (9)
  • 3
    • 0042823817 scopus 로고    scopus 로고
    • Association rule mining: Models and algorithms
    • Springer-Verlag, Germany
    • Chengqi Zhang and Shichao Zhang., Association Rule Mining: Models and Algorithms, LNAI 2307, Springer-Verlag, Germany 2002.
    • (2002) LNAI , vol.2307
    • Zhang, C.1    Zhang, S.2
  • 6
    • 84976665942 scopus 로고
    • Timestamp in key distribution protocols
    • August
    • Denning D., Sacco G., Timestamp in Key Distribution Protocols, Communications of ACM 24(8), pp 533-536, August 1981.
    • (1981) Communications of ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 7
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Dec
    • Needham R., and Schroeder M., Using Encryption for Authentication in Large Networks of Computers. Comm. of the ACM, 21(12), pp 993-999, Dec 1978.
    • (1978) Comm. of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.