咨询与建议

限定检索结果

文献类型

  • 2 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 工学
    • 1 篇 计算机科学与技术...
    • 1 篇 软件工程

主题

  • 2 篇 authentication
  • 1 篇 bridges
  • 1 篇 network servers
  • 1 篇 certification
  • 1 篇 intelligent netw...
  • 1 篇 security
  • 1 篇 protocols
  • 1 篇 distributed comp...
  • 1 篇 computer network...
  • 1 篇 wide area networ...

机构

  • 1 篇 distributed syst...
  • 1 篇 basser dept. of ...
  • 1 篇 distributed syst...
  • 1 篇 basser departmen...
  • 1 篇 distributed syst...

作者

  • 1 篇 v. varadharajan
  • 1 篇 hitchens m.
  • 1 篇 m. hitchens
  • 1 篇 varadharajan v.

语言

  • 2 篇 英文
检索条件"机构=Distributed Systems and Network Security Research Uniti Department of Computing"
2 条 记 录,以下是1-10 订阅
排序:
Design choices for symmetric key based inter-domain authentication protocols in distributed systems  12
Design choices for symmetric key based inter-domain authenti...
收藏 引用
12th Annual Computer security Applications Conference, ACSAC 1996
作者: Hitchens, M. Varadharajan, V. Basser Dept. of Computer Science University of Sydney Australia Distributed Systems and Network Security Research Unit United States Distributed Systems and Network Department of Computing Univeristy of Western Sydney Australia
Authentication is a key requirement in the establishment of secure interactions between network entities. Several authentication and key establishment protocols have been proposed in recent years. Most of these protoc... 详细信息
来源: 评论
Design choices for symmetric key based inter-domain authentication protocols in distributed systems
Design choices for symmetric key based inter-domain authenti...
收藏 引用
Annual Computer security Applications Conference
作者: M. Hitchens V. Varadharajan Basser Department of Computer Science University of Sydney Australia Distributed Systems and Network Security Research Uniti Department of Computing University of Western Sydney Australia
Authentication is a key requirement in the establishment of secure interactions between network entities. Several authentication and key establishment protocols have been proposed in recent years. Most of these protoc... 详细信息
来源: 评论