dc.contributor.author | HLOPEANICOV, Claudia | |
dc.date.accessioned | 2020-05-06T10:11:52Z | |
dc.date.available | 2020-05-06T10:11:52Z | |
dc.date.issued | 2018 | |
dc.identifier.citation | HLOPEANICOV, Claudia. Analysis of security protocols in the information system. In: Telecomunicaţii, Electronică şi Informatică: proc. of the 6th intern. conf., May 24-27, 2018. Chişinău, 2018, pp. 360-362. ISBN 978-9975-45-540-4. | en_US |
dc.identifier.isbn | 978-9975-45-540-4 | |
dc.identifier.uri | http://repository.utm.md/handle/5014/8091 | |
dc.description.abstract | The standards are essential to ensure interoperabilitz protocols worldwide. They are divided into two categories: standard de facto and in law standards. De facto standards were not originally approved by any institution but they were adopted due to the spread and use them widespread. Instead, in law standards are approved from the moment of their creation by a competent international body. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Tehnica UTM | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | security protocols | en_US |
dc.subject | protocols | en_US |
dc.subject | information systems | en_US |
dc.subject | information security | en_US |
dc.title | Analysis of security protocols in the information system | en_US |
dc.type | Article | en_US |
The following license files are associated with this item: