메뉴 건너뛰기




Volumn , Issue , 1997, Pages 104-109

Using content-derived names for configuration management

Author keywords

[No Author keywords available]

Indexed keywords

LIBRARIES; REUSABILITY; SOFTWARE TESTING;

EID: 84999041148     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/258366.258399     Document Type: Conference Paper
Times cited : (12)

References (8)
  • 1
    • 0003629991 scopus 로고
    • FTPS-180-1, National Institute of Standards and Technology, U.S. Department of Commerce, April
    • Secure Hash Standard, FTPS-180-1, National Institute of Standards and Technology, U.S. Department of Commerce, April 1995.
    • (1995) Secure Hash Standard
  • 3
    • 0028713264 scopus 로고
    • The use of encryption to ensure the inbtegrity of reusable software components
    • Nov. Rio de Janeiro
    • J. W. Moore, "The Use of Encryption to Ensure the Inbtegrity of Reusable Software Components", International Conference on Software Reuse. Nov. 1994, Rio de Janeiro, pp. 118-123.
    • (1994) International Conference on Software Reuse , pp. 118-123
    • Moore, J.W.1
  • 7
    • 1542313506 scopus 로고
    • Performance analysis of MD5
    • Aug Cambridge, MA
    • J. D. Touch, "Performance Analysis of MD5", SIGCOMM. Aug 1995, Cambridge, MA, pp. 77-86.
    • (1995) SIGCOMM , pp. 77-86
    • Touch, J.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.