Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/37849
DC FieldValueLanguage
dc.contributor.authorHorng, G.en_US
dc.contributor.author洪國寶zh_TW
dc.contributor.authorHsu, C.K.en_US
dc.date1998zh_TW
dc.date.accessioned2014-06-06T08:00:12Z-
dc.date.available2014-06-06T08:00:12Z-
dc.identifier.issn0013-5194zh_TW
dc.identifier.urihttp://hdl.handle.net/11455/37849-
dc.description.abstractThe authors outline an attack on the Helsinki protocol for entity-authentication and authenticated key exchange, which was proposed for standardisation within the ISO/IEC CD 11770-3 standard draft in 1995.en_US
dc.language.isoen_USzh_TW
dc.relationElectronics Lettersen_US
dc.relation.ispartofseriesElectronics Letters, Volume 34, Issue 4, Page(s) 354-355.en_US
dc.relation.urihttp://dx.doi.org/10.1049/el:19980242en_US
dc.titleWeakness in the Helsinki protocolen_US
dc.typeJournal Articlezh_TW
dc.identifier.doi10.1049/el:19980242zh_TW
Appears in Collections:資訊科學與工程學系所
文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.