메뉴 건너뛰기




Volumn 2041, Issue , 2001, Pages 73-89

Secure internet smartcards

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; HARDWARE SECURITY; JAVA PROGRAMMING LANGUAGE; MIDDLEWARE; NETWORK SECURITY; OBJECT ORIENTED PROGRAMMING;

EID: 84885549887     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45165-x_6     Document Type: Conference Paper
Times cited : (4)

References (23)
  • 10
  • 13
    • 84959028608 scopus 로고    scopus 로고
    • In, Proceedings of USENIX Workshop on Smartcard Technology, Chicago, May
    • Naomaru Itoi and Peter Honeyman. Smartcard integration with Kerberos V5. In Proceedings of USENIX Workshop on Smartcard Technology, Chicago, May 1999.
    • (1999) Smartcard Integration with Kerberos V5
    • Itoi, N.1    Honeyman, P.2
  • 16
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • Ecole Normale Superieure, April
    • Stephan Lucks. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In The Security Protocol Workshop’97, Ecole Normale Superieure, April 1997.
    • (1997) The Security Protocol Workshop’97
    • Lucks, S.1
  • 19
    • 0003651919 scopus 로고    scopus 로고
    • Network Working Group Request for Comments, October 1996
    • C. Perkins. Ip mobility support. Network Working Group Request for Comments: 2002, October 1996.
    • (2002) Ip Mobility Support
    • Perkins, C.1
  • 21
    • 0003855464 scopus 로고    scopus 로고
    • John Wiley & Sons, Inc., 2 edition
    • Bruce Schneier. Applied Cryptography. John Wiley & Sons, Inc., 2 edition, 1996.
    • (1996) Applied Cryptography
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.