메뉴 건너뛰기




Volumn , Issue , 2010, Pages 241-250

Keeping data secret under full compromise using porter devices

Author keywords

full compromise; security protocol; system security

Indexed keywords

AUTOMATIC VERIFICATION TOOLS; CONFIDENTIAL DATA; FORWARD SECRET; FULL COMPROMIZE; KEY STORAGE; NEW SOLUTIONS; SECURITY PROTOCOLS; SYSTEM SECURITY;

EID: 78751506483     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1920261.1920297     Document Type: Conference Paper
Times cited : (11)

References (36)
  • 4
    • 85170005928 scopus 로고    scopus 로고
    • Bouncy Castle Crypto APIs. http://www.bouncycastle.org.
  • 10
    • 78751505426 scopus 로고    scopus 로고
    • Bluetooth SIG, Inc. version 3.0 + HS
    • Bluetooth SIG, Inc. Bluetooth specification version 3.0 + HS, 2009.
    • (2009) Bluetooth Specification
  • 25
    • 85170015660 scopus 로고    scopus 로고
    • Disappearing Inc. http://www.disappearing-inc.com.
  • 31
    • 0018545449 scopus 로고
    • How to share a secret
    • Adi Shamir. How to share a secret. Commununications of the ACM, 22(11):612-613, 1979.
    • (1979) Commununications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 35
    • 85170014280 scopus 로고    scopus 로고
    • NexusOne Smartphone
    • NexusOne Smartphone. http://www.htc.com.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.