The Mutual Authentication and Operation Methodology for an Enhanced Security and Operation of the IDL
Vol. 34, No. 2, pp. 188-202, Feb. 2009
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
S. Jeon and M. Jun, "The Mutual Authentication and Operation Methodology for an Enhanced Security and Operation of the IDL," The Journal of Korean Institute of Communications and Information Sciences, vol. 34, no. 2, pp. 188-202, 2009. DOI: .
[ACM Style]
Sang-hoon Jeon and Moon-suk Jun. 2009. The Mutual Authentication and Operation Methodology for an Enhanced Security and Operation of the IDL. The Journal of Korean Institute of Communications and Information Sciences, 34, 2, (2009), 188-202. DOI: .
[KICS Style]
Sang-hoon Jeon and Moon-suk Jun, "The Mutual Authentication and Operation Methodology for an Enhanced Security and Operation of the IDL," The Journal of Korean Institute of Communications and Information Sciences, vol. 34, no. 2, pp. 188-202, 2. 2009.