메뉴 건너뛰기




Volumn , Issue , 1998, Pages

A Java beans component architecture for cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMMING INTERFACES (API); ARCHITECTURE; JAVA PROGRAMMING LANGUAGE; NETWORK ARCHITECTURE; PUBLIC KEY CRYPTOGRAPHY;

EID: 85084162956     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (11)

References (33)
  • 8
    • 0026142839 scopus 로고
    • The ISIS project: Real experience with a fault tolerant programming system
    • April
    • Kenneth Birman and Robert Cooper, "The ISIS Project: Real Experience with a Fault Tolerant Programming System", Operating Systems Review, pp. 103-107, April 1991.
    • (1991) Operating Systems Review , pp. 103-107
    • Birman, K.1    Cooper, R.2
  • 15
    • 0025722247 scopus 로고
    • The x-kernel: An architecture for implementing network protocols
    • January
    • N. C. Hutchinson and L. L. Peterson, "The x-Kernel: An architecture for implementing network protocols." IEEE Transactions on Software Engineering, 17(1):64-76, January 1991.
    • (1991) IEEE Transactions on Software Engineering , vol.17 , Issue.1 , pp. 64-76
    • Hutchinson, N.C.1    Peterson, L.L.2
  • 17
    • 85063324040 scopus 로고
    • Development of authentication protocols: Some misconceptions and a new approach
    • IEEE Computer Society Press
    • Wenbo Mao and Colin A. Boyd, "Development of authentication protocols: some misconceptions and a new approach", Proceedings of IEEE Computer Security Foundations Workshop VII, IEEE Computer Society Press, 1994, pp. 178-186.
    • (1994) Proceedings of IEEE Computer Security Foundations Workshop VII , pp. 178-186
    • Mao, W.1    Boyd, C.A.2
  • 19
    • 85077771412 scopus 로고    scopus 로고
    • Internet security association and key management protocol (ISAKMP), internet-draft draft-ietf-ipsecisakmp-08.txt, work in progress
    • July
    • Douglas Maughan, Mark Schertler, Mark Schneider and Jeff Turner, Internet Security Association and Key Management Protocol (ISAKMP), Internet-Draft draft-ietf-ipsecisakmp-08.txt, work in progress, Internet Engineering Task Force, July 1997.
    • (1997) Internet Engineering Task Force
    • Maughan, D.1    Schertler, M.2    Schneider, M.3    Turner, J.4
  • 20
    • 0031188824 scopus 로고    scopus 로고
    • The next software breakthrough
    • IEEE Computer Society, July
    • Bertrand Meyer, "The Next Software Breakthrough", Computer, 30(7): 113-114, IEEE Computer Society, July 1997.
    • (1997) Computer , vol.30 , Issue.7 , pp. 113-114
    • Meyer, B.1
  • 21
    • 84949986536 scopus 로고    scopus 로고
    • Licenciate's Thesis, Helsinki University of Technology, December
    • Pekka Nikander, Modelling of Cryptographic Protocols, Licenciate's Thesis, Helsinki University of Technology, December 1997.
    • (1997) Modelling of Cryptographic Protocols
    • Nikander, P.1
  • 27
    • 23544459288 scopus 로고
    • Center for Information Technology Integration, Department of Electrical Engineering and Computer Science, University of Michigan, 8. November
    • Aviel D. Rubin and Peter Honeyman, Formal methods for the analysis of authentication protocols, Technical Report 93-7, Center for Information Technology Integration, Department of Electrical Engineering and Computer Science, University of Michigan, 8. November 1993.
    • (1993) Formal Methods for the Analysis of Authentication Protocols, Technical Report 93-7
    • Rubin, A.D.1    Honeyman, P.2
  • 28
    • 84976840280 scopus 로고
    • Using design patterns to develop reusable object-oriented communication software
    • October
    • Douglas C. Schmidt, "Using Design Patterns to Develop Reusable Object-Oriented Communication Software", Communications of the ACM, 38(10):65-74, October 1995.
    • (1995) Communications of the ACM , vol.38 , Issue.10 , pp. 65-74
    • Schmidt, D.C.1
  • 29
    • 0028532997 scopus 로고
    • Cryptanalysis and protocol failures
    • November
    • Gustavus J. Simmons, "Cryptanalysis and protocol failures", Communications of the ACM, 37(11):56-65, November 1994.
    • (1994) Communications of the ACM , vol.37 , Issue.11 , pp. 56-65
    • Simmons, G.J.1
  • 30
    • 85077769990 scopus 로고    scopus 로고
    • IP security document roadmap, internet-draft draft-ietf-ipsec-doc-roadmap-01.txt, work in progress
    • July
    • R. Thayer, N. Doraswamy and R. Glenn, IP Security Document Roadmap, Internet-Draft draft-ietf-ipsec-doc-roadmap-01.txt, work in progress, Internet Engineering Task Force, July 1997.
    • (1997) Internet Engineering Task Force
    • Thayer, R.1    Doraswamy, N.2    Glenn, R.3
  • 32
    • 84862171647 scopus 로고
    • The conduit: A communication abstraction in C++
    • San Francisco, CA, April 9-11 The Usenix Association 1990
    • Jonathan M. Zweig and Ralph E. Johnson, "The Conduit: A Communication Abstraction in C++", In Usenix C++ Conference Proceedings, San Francisco, CA, April 9-11, 1990, pp. 191-204. The Usenix Association 1990.
    • (1990) Usenix C++ Conference Proceedings , pp. 191-204
    • Zweig, J.M.1    Johnson, R.E.2
  • 33
    • 85077772087 scopus 로고    scopus 로고
    • White paper, Sun Microsystems August
    • Joanne Wu (Editor), Component-Based Software with Java Beans and ActiveX, White paper, Sun Microsystems, http://www.sun.com/javastation/whitepapers/java-beans/javabean-ch1.html, August 1997.
    • (1997) Component-Based Software with Java Beans and ActiveX
    • Wu, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.