메뉴 건너뛰기




Volumn Part F129230, Issue , 1998, Pages 2-10

Toward a secure system engineering methodology

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 85020200328     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/310889.310900     Document Type: Conference Paper
Times cited : (114)

References (15)
  • 6
    • 0004610703 scopus 로고    scopus 로고
    • Secure deletion of data from magnetic and solid-state memory
    • USENIX Association
    • P. Gutmann, "Secure Deletion of Data from Magnetic and Solid-State Memory," The Sixth USENIX Security Symposium Proceedings, USENIX Association, 1996, pp. 77-90.
    • (1996) The Sixth USENIX Security Symposium Proceedings , pp. 77-90
    • Gutmann, P.1
  • 8
    • 0003237987 scopus 로고
    • The kerberos network authentication service
    • Sep
    • J.T. Kohl and B.C. Neuman, "The Kerberos Network Authentication Service," RFC 1510, Sep 1993.
    • (1993) RFC 1510
    • Kohl, J.T.1    Neuman, B.C.2
  • 15
    • 24144470947 scopus 로고    scopus 로고
    • The dark side of 'Black-box' cryptography or: Should we trust capstone?
    • Springer-Verlag
    • A. Young and M. Yung, "The Dark Side of 'Black-Box' Cryptography or: Should We Trust Capstone?" Advances in Cryptology-Crypto '96 Proceedings, Springer-Verlag, 1996.
    • (1996) Advances in Cryptology-Crypto '96 Proceedings
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.