메뉴 건너뛰기




Volumn 219 LNCS, Issue , 1986, Pages 261-272

The Practice of Authentication

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; MILITARY COMMUNICATIONS; TRANSMITTERS;

EID: 85034654432     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-39805-8_31     Document Type: Conference Paper
Times cited : (8)

References (4)
  • 2
    • 0002579987 scopus 로고
    • Authentication Theory/Coding Theory
    • Santa Barbara, CA, August 19-22, Advances in Cryptology, Ed. by R. Blakley, Springer-Verlag, Berlin (1985), to appear
    • G. J. Simmons, “Authentication Theory/Coding Theory,” Proceedings of Crypto’84, Santa Barbara, CA, August 19-22, 1984, in Advances in Cryptology, Ed. by R. Blakley, Springer-Verlag, Berlin (1985), to appear.
    • (1984) Proceedings of Crypto’84
    • Simmons, G.J.1
  • 3
    • 85084889247 scopus 로고
    • Message Authentication Without Secrecy
    • ed. by G. J. Simmons, AAAS Selected Symposia Series, Westview Press, Boulder, CO
    • G. J. Simmons, “Message Authentication Without Secrecy,” in Secure Communications and Asymmetric Cryptosystems, ed. by G. J. Simmons, AAAS Selected Symposia Series, Westview Press, Boulder, CO (1982), pp. 105-139.
    • (1982) Secure Communications and Asymmetric Cryptosystems , pp. 105-139
    • Simmons, G.J.1
  • 4
    • 85034657222 scopus 로고
    • FIPS, Pub. 46, National Bureau of Standards, Washington, D.C., January
    • Data Encryption Standard, FIPS, Pub. 46, National Bureau of Standards, Washington, D.C., January 1977.
    • (1977)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.