메뉴 건너뛰기




Volumn 3841 LNCS, Issue , 2006, Pages 297-306

Detecting collusion attacks in security protocols

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC DATA INTERCHANGE; INFORMATION RETRIEVAL; INFORMATION TECHNOLOGY; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33745670893     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11610113_27     Document Type: Conference Paper
Times cited : (7)

References (9)
  • 3
    • 84976665942 scopus 로고
    • Timestamp in key distribution protocols
    • August
    • Denning D. and Sacco G., "Timestamp in Key Distribution Protocols", Communications of ACM, 24(8), pp 533-536, August 1981.
    • (1981) Communications of ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 4
    • 20344364418 scopus 로고    scopus 로고
    • ENDL: A logical framework for verifying secure transaction protocols
    • Qingfeng Chen, Chengqi Zhang and Shichao Zhang, "ENDL: A Logical Framework for Verifying Secure Transaction Protocols", Knowledge and Information Systems, 7(1), pp 84-109, 2005.
    • (2005) Knowledge and Information Systems , vol.7 , Issue.1 , pp. 84-109
    • Chen, Q.1    Zhang, C.2    Zhang, S.3
  • 6
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • September
    • Boneh D. and Shaw J., "Collusion-secure fingerprinting for digital data" IEEE Transactions on Information Theory, 44(5), pp. 1897-1905, September, 1998.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.