메뉴 건너뛰기




Volumn , Issue , 1999, Pages

Offline delegation

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; PERSONAL DIGITAL ASSISTANTS;

EID: 85084163879     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (19)
  • 3
    • 0003370741 scopus 로고
    • A security risk of depending on synchronized clocks
    • Gong, L. (1992). A Security Risk of Depending on Synchronized Clocks. ACM Operating Systems Review, 26(1).
    • (1992) ACM Operating Systems Review , vol.26 , Issue.1
    • Gong, L.1
  • 13
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., Shamir, A., and Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM, 21(2):120–126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 15
    • 84957697669 scopus 로고
    • Technical Report CS-TR 95-21, Department of Computer Science, University of Tromsø, Norway
    • Stabell-Kulø, T. (1995). File Repository Transfer Protocol (FRTP). Technical Report CS-TR 95-21, Department of Computer Science, University of Tromsø, Norway.
    • (1995) File Repository Transfer Protocol (FRTP)
    • Stabell-Kulø, T.1
  • 18
    • 84974755213 scopus 로고
    • Knowledge, belief and semantics in the analysis of cryptographic protocols
    • IOS Press
    • Syverson, P. (1992). Knowledge, Belief and Semantics in the Analysis of Cryptographic Protocols. Journal of Computer Security, 1(3):317–334. IOS Press.
    • (1992) Journal of Computer Security , vol.1 , Issue.3 , pp. 317-334
    • Syverson, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.