IRTUM – Institutional Repository of the Technical University of Moldova

Analysis of security protocols in the information system

Show simple item record

dc.contributor.author HLOPEANICOV, Claudia
dc.date.accessioned 2020-05-06T10:11:52Z
dc.date.available 2020-05-06T10:11:52Z
dc.date.issued 2018
dc.identifier.citation HLOPEANICOV, Claudia. Analysis of security protocols in the information system. In: Telecomunicaţii, Electronică şi Informatică: proc. of the 6th intern. conf., May 24-27, 2018. Chişinău, 2018, pp. 360-362. ISBN 978-9975-45-540-4. en_US
dc.identifier.isbn 978-9975-45-540-4
dc.identifier.uri http://repository.utm.md/handle/5014/8091
dc.description.abstract The standards are essential to ensure interoperabilitz protocols worldwide. They are divided into two categories: standard de facto and in law standards. De facto standards were not originally approved by any institution but they were adopted due to the spread and use them widespread. Instead, in law standards are approved from the moment of their creation by a competent international body. en_US
dc.language.iso en en_US
dc.publisher Tehnica UTM en_US
dc.rights Attribution-NonCommercial-NoDerivs 3.0 United States *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/3.0/us/ *
dc.subject security protocols en_US
dc.subject protocols en_US
dc.subject information systems en_US
dc.subject information security en_US
dc.title Analysis of security protocols in the information system en_US
dc.type Article en_US


Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 United States Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States

Search DSpace


Browse

My Account