Network Time Protocol Applying to Computer Identification
碩士 === 國立臺灣科技大學 === 資訊工程系 === 95 === One of the important security issues on network transaction is to develop trustworthy technologies for remote device identification. T. Kohno et al. proposed a method to generate remote physical device fingerprint recently. They observed that the hardware clock s...
Main Authors: | Kun-Ming Hong, 洪�J閔 |
---|---|
Other Authors: | Wei-Chung Teng |
Format: | Others |
Language: | zh-TW |
Online Access: | http://ndltd.ncl.edu.tw/handle/42533730985208667013 |
Similar Items
-
Apply to Identification and Key Agreement Protocol with User Anonymity
by: Jyun-Pei Siang, et al.
Published: (101) -
Real-Time IMC-PID Controller of Relay Feedback System Identification Applied in Flooded VSD Chiller
by: Yi-Min Wang, et al.
Published: (2013) -
On the understanding of computer network protocols
by: Berglund, Anders
Published: (2002) -
SECURITY PROTOCOLS IN NETWORKS OF COMPUTERS
by: EVALDO GONCALVES PELAES
Published: (1982) -
Protocol conversion for computer networks /
by: Shu, Jesse C.
Published: (1990)