|
Volumn , Issue , 2005, Pages 57-60
|
Application of 'Attack trees' in security analysis of digital contents E-commerce protocols with copyright protection
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER CRIME;
DISTRIBUTED COMPUTER SYSTEMS;
ELECTRONIC COMMERCE;
ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS;
NETWORK PROTOCOLS;
TREES (MATHEMATICS);
ATTACK TREES;
COPYRIGHT PROTECTION;
E-COMMERCE PROTOCOLS;
INTELLECTUAL PROPERTY RIGHTS;
SECURITY OF DATA;
|
EID: 42749101387
PISSN: 10716572
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ccst.2005.1594865 Document Type: Conference Paper |
Times cited : (7)
|
References (8)
|