JaeYong JEONG


An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading
JaeYong JEONG Yongsu PARK Yookun CHO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/05/01
Vol. E88-D  No. 5  pp. 1077-1081
Type of Manuscript:  LETTER
Category: Networks
Keyword: 
mobile communications securitynetwork securityauthentication
 Summary | Full Text:PDF