|
Volumn , Issue , 1997, Pages 59-68
|
Strategies against replay attacks
|
Author keywords
[No Author keywords available]
|
Indexed keywords
CRYPTOGRAPHY;
SECURITY SYSTEMS;
COMPUTING POWER;
CRYPTOGRAPHIC FUNCTIONS;
CRYPTOGRAPHIC PROTOCOLS;
DESIGN PRINCIPLES;
FULL INFORMATIONS;
MUTUAL TRUST;
PROTOCOL DESIGN;
REPLAY ATTACK;
SECURITY OF DATA;
|
EID: 85055823270
PISSN: 19401434
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/CSFW.1997.596787 Document Type: Conference Paper |
Times cited : (20)
|
References (14)
|