Näytä suppeat kuvailutiedot

dc.contributor.authorKiperberg, Michael
dc.contributor.authorZaidenberg, Nezer
dc.date.accessioned2022-08-17T08:28:07Z
dc.date.available2022-08-17T08:28:07Z
dc.date.issued2013
dc.identifier.citationKiperberg, M., & Zaidenberg, N. (2013). Efficient remote authentication. <i>Journal of Information Warfare</i>, <i>12</i>(3), 49-55. <a href="https://www.jinfowar.com/journal/volume-12-issue-3/efficient-remote-authentication" target="_blank">https://www.jinfowar.com/journal/volume-12-issue-3/efficient-remote-authentication</a>
dc.identifier.otherCONVID_23124994
dc.identifier.otherTUTKAID_59998
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/82638
dc.description.abstractIn 2003, Kennel and Jamieson described a method of remote machine authentication. By authentication, the authors meant that the remote machine is non-virtual, and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. The authors of this paper adapt the method described by Kennel and Jamieson to the real world so that itcan be applied without prior knowledge of theoperating system or the modules on the remote machine.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherPeregrine Technical Solutions, LLC
dc.relation.ispartofseriesJournal of Information Warfare
dc.relation.urihttps://www.jinfowar.com/journal/volume-12-issue-3/efficient-remote-authentication
dc.rightsIn Copyright
dc.subject.otherVirtual machine
dc.subject.otherdigital rights management
dc.subject.otherremote authentication
dc.subject.otherdatabase
dc.titleEfficient remote authentication
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202208174182
dc.contributor.laitosTietotekniikan laitosfi
dc.contributor.laitosDepartment of Mathematical Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.description.reviewstatuspeerReviewed
dc.format.pagerange49-55
dc.relation.issn1445-3312
dc.relation.numberinseries3
dc.relation.volume12
dc.type.versionpublishedVersion
dc.rights.copyright© Peregrine Technical Solutions, LLC, 2013
dc.rights.accesslevelopenAccessfi
dc.subject.ysotietoturva
dc.subject.ysovirtuaaliympäristö
dc.subject.ysotodentaminen
dc.subject.ysotietokoneet
dc.subject.ysoetäkäyttö
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p24778
jyx.subject.urihttp://www.yso.fi/onto/yso/p24130
jyx.subject.urihttp://www.yso.fi/onto/yso/p6787
jyx.subject.urihttp://www.yso.fi/onto/yso/p20557
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright