Art
J-GLOBAL ID:202002289661093595   Reference number:20A0777630

Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability

識別不能性に基づく計算完全記号攻撃者のための検証法【JST・京大機械翻訳】
Author (4):
Material:
Volume: 21  Issue:Page: 1-44  Publication year: 2019 
JST Material Number: A1264A  ISSN: 1529-3785  Document type: Article
Article type: 原著論文  Country of issue: United States (USA)  Language: ENGLISH (EN)
Abstract/Point:
Abstract/Point
Japanese summary of the article(about several hundred characters).
All summary is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
In recent years, a new approac...
   To see more with JDream III (charged).   {{ this.onShowAbsJLink("http://jdream3.com/lp/jglobal/index.html?docNo=20A0777630&from=J-GLOBAL&jstjournalNo=A1264A") }}
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
, 【Automatic Indexing@JST】
JST classification (3):
JST classification
Category name(code) classified by JST.
Code theory  ,  Data protection  ,  Computer networks 
Terms in the title (5):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page