메뉴 건너뛰기




Volumn 8, Issue 6, 2010, Pages 86-89

Logical methods in security and privacy

Author keywords

[No Author keywords available]

Indexed keywords

LOGICAL METHODS; SECURITY AND PRIVACY;

EID: 78650047205     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2010.180     Document Type: Article
Times cited : (1)

References (5)
  • 4
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • B. W. Lampson et al., "Authentication in Distributed Systems: Theory and Practice, " ACM Trans. Computer Systems, vol. 10, no. 4, 1992, pp. 265-310.
    • (1992) ACM Trans. Computer Systems , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.W.1
  • 5
    • 33751063543 scopus 로고    scopus 로고
    • Privacy and contextual integrity: Framework and applications
    • A. Barth et al., "Privacy and Contextual Integrity: Framework and Applications, " IEEE Symp. Security and Privacy, 2006, pp. 184-198.
    • (2006) IEEE Symp. Security and Privacy , pp. 184-198
    • Barth, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.