메뉴 건너뛰기




Volumn , Issue , 2015, Pages 77-81

A Method for secure RESTful web service

Author keywords

ID based Authentication; ID based encryption; RESTful web service

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; INFORMATION SCIENCE; REMOTE SENSING; SOLAR ENERGY; WEBSITES;

EID: 84945287122     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIS.2015.7166573     Document Type: Conference Paper
Times cited : (16)

References (16)
  • 4
    • 84867270431 scopus 로고    scopus 로고
    • Latencies of service invocation and processing of the REST and SOAP web service interfaces
    • 24-29 June
    • Aihkisalo, T. "Latencies of Service Invocation and Processing of the REST and SOAP Web Service Interfaces," Services (SERVICES), 2012 IEEE Eighth World Congress on, 24-29 June 2012, pp. 100-107
    • (2012) Services (SERVICES), 2012 IEEE Eighth World Congress on , pp. 100-107
    • Aihkisalo, T.1
  • 10
    • 84893223480 scopus 로고    scopus 로고
    • Cyber security for service oriented architectures in a Web 2. 0 world: An overview of SOA vulnerabilities in financial services
    • 12 Nov
    • Masood, A., "Cyber security for service oriented architectures in a Web 2.0 world: An overview of SOA vulnerabilities in financial services", Technologies for Homeland Security (HST), 2013 IEEE International Conference on, 12 Nov. 2013, pp. 1-6
    • (2013) Technologies for Homeland Security (HST), 2013 IEEE International Conference on , pp. 1-6
    • Masood, A.1
  • 14
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Springer-Verlag
    • V. S. Miller, "Use of Elliptic Curves in Cryptography," in Advances in Cryptology-CRYPTO '85: Proceedings. vol. 218: Springer-Verlag, 1986, pp. 417-426.
    • (1986) Advances in Cryptology-CRYPTO '85: Proceedings , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 15
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N.Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, pp. 203-209, 1987.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.