메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 137-138

The authentication of the user from the remote autonomous object

Author keywords

Authentication; Communication channels; Control systems; Cryptography; Data acquisition; High level synthesis; Informatics; Intrusion detection; Public key; Telecommunication control

Indexed keywords

ALGORITHMS; COMMUNICATION CHANNELS (INFORMATION THEORY); CONTROL SYSTEM SYNTHESIS; CONTROL SYSTEMS; CRYPTOGRAPHY; DATA ACQUISITION; ELECTRON DEVICES; HIGH LEVEL SYNTHESIS; INTRUSION DETECTION; TELECOMMUNICATION CONTROL;

EID: 84874957976     PISSN: 18153712     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SREDM.2003.1224206     Document Type: Conference Paper
Times cited : (5)

References (1)
  • 1
    • 0017930809 scopus 로고
    • A method for Obtaining Digital Signatures and Public Key Cryptosystems
    • February
    • R. Rivest, A. Shamir, and L. Adieman, "A method for Obtaining Digital Signatures and Public Key Cryptosystems." Communications of the ACM, February 1978.
    • (1978) Communications of the ACM
    • Rivest, R.1    Shamir, A.2    Adieman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.