Search Results - C.2.8.a algorithm/protocol design and analysis D.4.6 security and privacy protection
-
1
Authors: et al.
Contributors: et al.
Source: IEEE Transactions on Dependable and Secure Computing. 16:969-983
Subject Terms: C.2.8.a algorithm/protocol design and analysis D.4.6 security and privacy protection, D.4.6.gverification, C.2.2.c protocol verification, D.4.6.b authentication, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, C.2.2 network protocols
File Description: application/pdf
-
2
-
3
Subject Terms: C.2.8.a algorithm/protocol design and analysis D.4.6 security and privacy protection, D.4.6.gverification, C.2.2.c protocol verification, D.4.6.b authentication, C.2.2 network protocols
Full Text Finder
Nájsť tento článok vo Web of Science