Art
J-GLOBAL ID:200902101836271818   Reference number:00A0802872

Theory and Applications of Information Security. Verification Method for Consistency and Normal Termination Agreement on Multiple Sessions with the Same Principals in a Security Protocol.

情報セキュリティの理論と応用 セキュリティプロトコルの一貫性および正常終了一致の同一参加者による複数セッションを考慮した検証法
Author (2):
Material:
Volume: 41  Issue:Page: 2281-2290  Publication year: Aug. 15, 2000 
JST Material Number: Z0778A  ISSN: 0387-5806  Document type: Article
Article type: 原著論文  Country of issue: Japan (JPN)  Language: JAPANESE (JA)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
,...
Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

   To see more with JDream III (charged).   {{ this.onShowAbsJLink("http://jdream3.com/lp/jglobal/index.html?docNo=00A0802872&from=J-GLOBAL&jstjournalNo=Z0778A") }}
JST classification (2):
JST classification
Category name(code) classified by JST.
Data protection  ,  Theory of computation 

Return to Previous Page