메뉴 건너뛰기




Volumn , Issue , 2000, Pages

End-to-end authorization

Author keywords

[No Author keywords available]

Indexed keywords

AUTHORIZATION SYSTEMS; DISTRIBUTED SYSTEMS; END TO END; HOP BY HOP; UNIFIED APPROACH;

EID: 84961968703     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (30)

References (26)
  • 2
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • Jan.
    • M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, Jan. 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 15
    • 0003603463 scopus 로고    scopus 로고
    • Computing McGraw-Hill, July
    • K. Moss. Java Servlets. Computing McGraw-Hill, July 1998.
    • (1998) Java Servlets
    • Moss, K.1
  • 18
    • 0342432719 scopus 로고    scopus 로고
    • Internet draft draft-rivest-sexp-00.txt (expired), May
    • R. Rivest. S-Expressions. Internet draft draft-rivest-sexp-00.txt (expired), May 1997.
    • (1997) S-Expressions
    • Rivest, R.1
  • 24
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • V. Voydock and S. Kent. Security mechanisms in high-level network protocols. Computing Surveys, 15(2):135-171, 1983.
    • (1983) Computing Surveys , vol.15 , Issue.2 , pp. 135-171
    • Voydock, V.1    Kent, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.