Suchergebnisse - "C.2.8.a algorithm/protocol design and analysis D.4.6 security and privacy protection"
-
1
Autoren: et al.
Weitere Verfasser: et al.
Quelle: IEEE Transactions on Dependable and Secure Computing. 16:969-983
Schlagwörter: C.2.8.a algorithm/protocol design and analysis D.4.6 security and privacy protection, D.4.6.gverification, C.2.2.c protocol verification, D.4.6.b authentication, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, C.2.2 network protocols
Dateibeschreibung: application/pdf
-
2
-
3
Schlagwörter: C.2.8.a algorithm/protocol design and analysis D.4.6 security and privacy protection, D.4.6.gverification, C.2.2.c protocol verification, D.4.6.b authentication, C.2.2 network protocols
Full Text Finder
Nájsť tento článok vo Web of Science