|
Volumn 2003-January, Issue , 2003, Pages 137-138
|
The authentication of the user from the remote autonomous object
|
Author keywords
Authentication; Communication channels; Control systems; Cryptography; Data acquisition; High level synthesis; Informatics; Intrusion detection; Public key; Telecommunication control
|
Indexed keywords
ALGORITHMS;
COMMUNICATION CHANNELS (INFORMATION THEORY);
CONTROL SYSTEM SYNTHESIS;
CONTROL SYSTEMS;
CRYPTOGRAPHY;
DATA ACQUISITION;
ELECTRON DEVICES;
HIGH LEVEL SYNTHESIS;
INTRUSION DETECTION;
TELECOMMUNICATION CONTROL;
AUTONOMOUS OBJECTS;
INFORMATICS;
PUBLIC KEYS;
AUTHENTICATION;
|
EID: 84874957976
PISSN: 18153712
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/SREDM.2003.1224206 Document Type: Conference Paper |
Times cited : (5)
|
References (1)
|