원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.8 No.2
2014.03
pp.323-332
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Problem Formulation
A. System Model
B. Threat models and Design Goals
C. Natations and Preliminaries
3. Proposed Scheme
A. Our Scheme
4. Performance and Security Analysis
D. Efficiency
E. F-measure
F. Performance Analysis
G. Security Analysis
5. Conclusion
Acknowledgments
References
1. Introduction
2. Problem Formulation
A. System Model
B. Threat models and Design Goals
C. Natations and Preliminaries
3. Proposed Scheme
A. Our Scheme
4. Performance and Security Analysis
D. Efficiency
E. F-measure
F. Performance Analysis
G. Security Analysis
5. Conclusion
Acknowledgments
References
저자정보
참고문헌
자료제공 : 네이버학술정보