References of "Journal of Information Security"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailExtending the Strand Space Method with Timestamps: Part I the Theor
Li, Yongjian; Pang, Jun UL

in Journal of Information Security (2010), 1(2), 45-55

Detailed reference viewed: 54 (0 UL)
Full Text
Peer Reviewed
See detailExtending the Strand Space Method with Timestamps: Part II Application to Kerberos V
Li, Yongjiang; Pang, Jun UL

in Journal of Information Security (2010), 1(2), 56-67

Detailed reference viewed: 110 (0 UL)