위임기반 인증 프로토콜의 프라이버시 취약성 분석
Vol. 20, No. 6, pp. 53-58,
12월.
2010
10.13089/JKIISC.2010.20.6.53, Full Text:
Keywords: Privacy, authentication, Security analysis
Abstract Statistics
Cite this article
10.13089/JKIISC.2010.20.6.53, Full Text:
Keywords: Privacy, authentication, Security analysis
Abstract Statistics
Cite this article
[IEEE Style]
T. Youn and C. Kim, "Privacy Weakness Analysis of Delegation-Based Authentication Protocol," Journal of The Korea Institute of Information Security and Cryptology, vol. 20, no. 6, pp. 53-58, 2010. DOI: 10.13089/JKIISC.2010.20.6.53.
[ACM Style]
Taek-Young Youn and Chang-Han Kim. 2010. Privacy Weakness Analysis of Delegation-Based Authentication Protocol. Journal of The Korea Institute of Information Security and Cryptology, 20, 6, (2010), 53-58. DOI: 10.13089/JKIISC.2010.20.6.53.