A cross-authentication model and implementation

Li, Z, Chen, Q and Xiang, Yang 2008, A cross-authentication model and implementation, COMPUTER SYSTEMS SCIENCE AND ENGINEERING, vol. 23, no. 3, pp. 167-181.


Title A cross-authentication model and implementation
Author(s) Li, Z
Chen, Q
Xiang, YangORCID iD for Xiang, Yang orcid.org/0000-0001-5252-0831
Journal name COMPUTER SYSTEMS SCIENCE AND ENGINEERING
Volume number 23
Issue number 3
Start page 167
End page 181
Total pages 15
Publisher C R L PUBLISHING LTD
Publication date 2008-05-01
ISSN 0267-6192
Keyword(s) Science & Technology
Technology
Computer Science, Hardware & Architecture
Computer Science, Theory & Methods
Computer Science
active networks
authentication
heterogeneous domains
PKI
ID-PKC
Language eng
Field of Research 0805 Distributed Computing
HERDC Research category CN.1 Other journal article
Persistent URL http://hdl.handle.net/10536/DRO/DU:30095833

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 17 Abstract Views  -  Detailed Statistics
Created: Thu, 11 May 2017, 14:58:52 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.