![]() |
Volumn 4, Issue 4, 2006, Pages 84-87
|
Applying protocol analysis to security device interfaces
|
Author keywords
[No Author keywords available]
|
Indexed keywords
AUTOMATIC TELLER MACHINES;
COMPUTER CRIME;
CRYPTOGRAPHY;
IDENTIFICATION (CONTROL SYSTEMS);
INTERFACES (COMPUTER);
NETWORK PROTOCOLS;
PROBLEM SOLVING;
APPLYING PROTOCOL ANALYSIS;
PERSONAL IDENTIFICATION NUMBERS (PIN);
SECURITY DEVICE INTERFACES;
TRUSTED PLATFORM MODULE (TPM);
SECURITY SYSTEMS;
|
EID: 33747255010
PISSN: 15407993
EISSN: None
Source Type: Journal
DOI: 10.1109/MSP.2006.85 Document Type: Review |
Times cited : (17)
|
References (13)
|