메뉴 건너뛰기




Volumn 1768, Issue , 2000, Pages 448-462

Protecting secret keys in a compromised computational system

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; AUTHENTICATION; CRYPTOGRAPHY;

EID: 84947930522     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10719724_31     Document Type: Conference Paper
Times cited : (3)

References (14)
  • 2
    • 84947985844 scopus 로고    scopus 로고
    • Dash O-Pro Obfuscator optimising compiler for Java
    • Dash O-Pro Obfuscator optimising compiler for Java. http://www.preemptive.com/DashO/obfuscate.html 450
  • 12
    • 84947985849 scopus 로고    scopus 로고
    • Java Code Engineering & Reverse Engineering
    • Java Code Engineering & Reverse Engineering. http://meurrens.ml.org/ip-Links/Java/CodeEngineering/mm scale.html 450
  • 13
    • 0003855464 scopus 로고    scopus 로고
    • Second Edition, John Wiley & Sons
    • Bruce Schneier. Applied Cryptography, Second Edition, John Wiley & Sons, 1996 458
    • (1996) Applied Cryptography , pp. 458
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.