0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

ACM Software System Calendar 2024
https://qiita.com/advent-calendar/2024/acm
Day 5 投稿記事です。

記事をお読みになられたら、Calendarにあってもいいかなって記事には、いいね💚 をお願いします。

SECURE NETWORK PROGRAMMING

Raghuram Bindignavle
https://www.cs.utexas.edu/~lam/Vita/Cpapers/WBSL94.pdf

Reference

16が、RPCかXDRかが判定できない。RFC番号があってるとすると違う文章。タイトルがあっているとすると違うRFC番号。

[1] CCITT Recommendation X.208 Specification of Abstract Syntax Notation one (ASN.1), 1988. 8824, 1989. See also ISO/IEC

INTERNATIONAL STANDARD ISO/IEC 8824-1
ITU-T Recommendation X.680 SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS
OSI networking and system aspects – Abstract Syntax Notation One (ASN.1)
https://www.itu.int/ITU-T/studygroups/com17/languages/X.680-0207.pdf

2.1 Identical Recommendations | International Standards

– CCITT Recommendation X.660 (1992) | ISO/IEC 9834-1:1993, Information technology – Open Systems Interconnection – Procedures for the operation of OSI Registration Authorities: General procedures: (plus amendments).
– ITU-T Recommendation X.681 (2002) | ISO/IEC 8824-2:2002, Information technology – Abstract Syntax Notation One (ASN.1): Information object specification.
– ITU-T Recommendation X.682 (2002) | ISO/IEC 8824-3:2002, Information technology – Abstract Syntax Notation One (ASN.1): Constraint specification.
– ITU-T Recommendation X.683 (2002) | ISO/IEC 8824-4:2002, Information technology – Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications.
– ITU-T Recommendation X.690 (2002) | ISO/IEC 8825-1:2002, Information technology – ASN.1 encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER).
– ITU-T Recommendation X.691 (2002) | ISO/IEC 8825-2:2002, Information technology – ASN.1 encoding rules: Specification of Packed Encoding Rules (PER).
– ITU-T Recommendation X.692 (2002) | ISO/IEC 8825-3:2002, Information technology – ASN.1 encoding rules: Specification of Encoding Control Notation (ECN).

2.2 Additional reference

– ITU-T Recommendation X.693 (2001) | ISO/IEC 8825-4:2002, Information technology – ASN.1 encoding rules: XML Encoding Rules (XER).
Additional references
– ITU-R Recommendation TF.460-5 (1997), Standard-frequency and time-signal emissions.
– CCITT Recommendation T.100 (1988), International information exchange for interactive videotex.
– ITU-T Recommendation T.101 (1994), International interworking for videotex services.
– ISO International Register of Coded Character Sets to be used with Escape Sequences.
– ISO/IEC 646:1991, Information technology – ISO 7-bit coded character set for information interchange.
– ISO/IEC 2022:1994, Information technology – Character code structure and extension techniques.
– ISO/IEC 6523:1998, Data interchange – Structures for the identification of organizations.
– ISO/IEC 7350:1991, Information technology – Registration of repertoires of graphic characters from ISO/IEC 10367.
– ISO 8601:2000, Data elements and interchange formats – Information interchange – Representation of dates and times.
– ISO/IEC 10646-1:2000, Information technology – Universal Multiple-Octet Coded Character Set (UCS) – Part 1: Architecture and Basic Multilingual Plane.
– The Unicode Standard, Version 3.2.0:2002. The Unicode Consortium. (Reading, MA, Addison-Wesley)
NOTE 1 – The above reference is included because it provides names for control characters.
– W3C XML 1.0:2000, Extensible Markup Language (XML) 1.0 (Second Edition), W3C Recommendation, Copyright © [6 October 2000] World Wide Web Consortium, (Massachusetts Institute of Technology, Institut National de Recherche en Informatique et en Automatique, Keio University), http://www.w3.org/TR/2000/REC-xml-20001006.
NOTE 2 – The reference to a document within this Recommendation | International Standard does not give it, as a stand-alone document, the status of a Recommendation or International Standard.

[2] A.D. Birrell. Secure communication using remote procedure calls.

ACM Transactions on Computer Systems, 3(1):1–14, February 1985.
https://dl.acm.org/doi/10.1145/214451.214452

[3] J. Ioannidis and M. Blaze. The architecture and implementation of n#etwork-layer security under unix.

In Proceedings of 4th Usenix Unix Security Workshop, Santa Clara, Cali- fornia, October 4–6 1993.
https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=9415288dd0536075cf8802cf0257c76f7f2d5947

References

[1] S. M. Bellovin. Pseudo-Network Drivers and Virtual Networks – Extended Abstract. In Usenix Con- ference Proceedings, pages 229–244. Usenix, January 1990.
[2] Matt Blaze. A cryptographic file system for Unix. In First ACM Conference on Communications and Computing Security, Fairfax, VA, November 1993.
[3] W. Diffie and M. E. Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory}, IT-22:644–654, 1976.
[4] D. P. Anderson et al. A Protocol for Secure Communication in Large Distributed Systems. Technical Report UCB/CSD 87/342, University of California, Berkeley, February 1987.
[5] John Ioannidis. Protocols for Mobile Internetworking. Ph.D. thesis, Columbia University in the City of New York, 1993.
[6] John Ioannidis, Matt Blaze, and Phil Karn. swIPe: The IP Security Protocol. To appear.
[7] John Ioannidis, Dan Duchamp, and Gerald Q. Maguire Jr. IP-Based Protocols for Mobile Internet- working. In Proceedings of SIGCOMM’91, pages 235–245. ACM, September 1991.
[8] ISO/IEC JTC1/SC6. ISO-IEC DIS 11577 – Information Technology –Telecommunications and Infor- mation Exchange Between Systems – Network Layer Security Protocol, November 29 1992.
[9] X. Lai and J. Massey. A Proposal for a New Block Encryption Standard. Proc. EUROCRYPT 90, pages 389–404, 1990.
[10]Mykotronx, Inc. MYK-78 Encryption/Decryption Device. Data Sheet, 1993.
[11]National Bureau of Standards. FIPS Publication 46-1: Data Encryption Standard, January 1988.
[12]National Institute of Standards and Technology. NISTIR 90-4250: Secure Data Network System (SDNS) Network, Transport, and Message Security Protocols, February 1990.
[13]National Institute of Standards and Technology. Publication YY: Announcement and Specifications for a Secure Hash Standard (SHS), January 22, 1992.
[14]R.L. Rivest. RFC 1321: The MD5 Message-Digest Algorithm. Internet Activities Board, April 1992.
[15]R.L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM, 21(2):120–126, February 1978.
[16]J. Steiner, C. Neuman, and J. Schiller. Kerberos: An authentication service for open network systems. Proc. Usenix Winter Conference, February 1988.

[4] RSA Laboratories. RSAREF: A cryptographic toolkit for privacy-enhanced mail.

January 5 1993.
https://sourceforge.net/projects/rsaref/files/

[5] J.B. Lacy, D.P. Mitchell, and W.M. Schell. Cryptolib: Cryptography in software.

In Proceedings of Usenix Unix Security Workshop IV, pages 1–17, Santa Clara, California, October 4–6 1993.
http://mentallandscape.com/Papers_usenix93.pdf

4. References

[Rivest 78] R. L. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM 21,2 (Feb, 1978), 120-126.
[ElGamal 85] Taher ElGamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory IT-31,4 (July, 1985), 469-472.
[Knuth 80] Donald E. Knuth. The Art of Computer Programming, Vol 2: Seminumerical Algorithms. (Addison-Wesley, 1982, 2nd edn.)
[Brickell 89] Ernest F. Brickell. A Survey of Hardware Implementations of RSA. Viewgraphs from a Technical talk by Brickell at AT&T Bell Laboratories, Murray Hill, NJ, (Sept 12, 1989).
[Mont 85] Peter L. Montgomery. Modular Multiplication Without Trial Division. Mathematics of Computation 44,170 (April, 1985), 519-521.
[Dusse ́ 85] Stephen R. Dusse ́ et. al. A Cryptographic Library for the Motorola DSP56000. Advances in Cryptology - EUROCRYPT ’90 I.B. Damgard ed., Springer Lecture Notes in CS #473, 1991, pp. 230-244.
[Gordon 84] J. A. Gordon. Strong Primes are Easy to Find. Proc. Eurocrypt-84, Paris, April, 1984.
[MD5 91] RSA Data Security, Inc. MD5 Message-Digest Algorithm. Copyright (C) 1990, RSA Data Security, Inc. All rights reserved. Received via the net.
[Diffie 76] W. Diffie and M. Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory IT-22,6 (Nov, 1976), 644-654.
[NIST 91] National Institute of Standards and Technology (NIST). Digital Signature Standard. Federal Information Processing Standards Publication XX National Technical Information Service, U.S. Dept. of Commerce, 1991.
[NIST 99] National Institute of Standards and Technology (NIST). Secure Hash Standard Federal Information Processing Standards Publication YY National Technical Information Service, U.S. Dept. of Commerce, 1992.
[DES 77] Data Encryption Standard. Federal Information Processing Standards Publication 46-1 National Technical Information Service, U.S. Dept. of Commerce, 1977.
[Bong 89] Dieter Bong and Christoph Ruland. Optimized Software Implementations of the Modular Exponentiation on General Purpose Microprocessors. Computers and Security 8,7 (1989), 621-630.
[Mars 91] George Marsaglia and Arif Zaman. A New Class of Random Number Generators. The Annals of Applied Probability, 1,3 (1991), 462-480

[6] B. Lampson, M. Abadi, M. Burrows, and T. Wobber. Authentication in distributed systems: Theory and practice.

In Proceedings of 13th ACM Symposium on Operating Systems Principles, pages 165–182, Asilomar Conference Center, Pacific Grove, California, October 13–16 1991.
https://www.cs.utexas.edu/~shmat/courses/cs380s/lampson92.pdf

REFERENCES

  1. ABADI, M., BURROWS, M., KAUFMAN, C., AND LAMPSON, B. Authentication and delegation with smart-cards. In Theoretical Aspects of Computer Software, LNCS 526, Springer, 1991, pp. 326-345. Also Res. Rep. 67, Systems Research Center, Digital Equipment Corp., Palo Alto, Calif., Oct. 1990. To appear in Science of Computer Programming.
  2. ABADI, M., BURROWS, M., LAMPSON, B., AND PLOTKIN, G. A calculus for access control in distributed systems. In Advances in Cryptology----- Crypto ’91, LNCS 576, Springer, 1992, pp. 1-23. Also Res. Rep. 70, Systems Research Center, Digital Equipment Corp., Palo Alto, Calif., March 1991. To appear in ACM Trans. Program. Lang. Syst.
  3. BIRRELL, A., LAMPSON, B., NEEDHAM, R., AND SCHROEDER, M. Global authentication without global trust. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 1986), pp. 223-230.
  4. BURROWS, M., ABADI, M., AND NEEDHAM, R. A logic of authentication. ACM Trans. Comput. Syst. 8, 1 (Feb. 1990), 18-36. An expanded version appeared in Proc. Royal Society A 426, 1871 (Dec. 1989), 233-271 and as Res. Rep. 39, Systems Research Center, Digital Equipment Corp., Palo Alto, Calif., Feb. 1989.
  5. CCITT. Information Processing Systems - Open Systems Interconnection - The Directory Authentication Framework. CCITT 1988 Recommendation X.509. Also ISO/IEC 9594-8:1989.
  6. COMBA, P. Exponentiation cryptosystems on the IBM PC. IBM Syst. J. 28, 4 (Jul. 1990), 526- 538.
    Lampson et al, Authentication in Distributed Systems 45
  7. DAVIS, D. AND SWICK, R. Network security via private-key certificates. ACM Oper. Syst. Rev. 24, 4 (Oct. 1990), 64-67.
  8. DENNING, D. A lattice model of secure information flow. Commun. ACM 19, 5 (May 1976), 236-243.
  9. DEPARTMENT OF DEFENSE. Trusted Computer System Evaluation Criteria. DOD 5200.28- STD, 1985.
  10. DIFFIE, W. AND HELLMAN, M. New directions in cryptography. IEEE Trans. Inf. Theor. IT- 22, 6 (Nov. 1976), 644-654.
  11. EBERLE, H. AND THACKER, C. A 1 Gbit/second GaAs DES chip. In Proceedings of the IEEE 1992 Custom Integrated Circuit Conference (Boston, Mass., May 1992), pp. 19.7.1-19.7.4.
  12. GASSER, M., GOLDSTEIN, A., KAUFMAN, C., AND LAMPSON, B. The Digital distributed sys- tem security architecture. In Proceedings of the 12th National Computer Security Conference (Baltimore, Md., Oct. 1989), pp. 305-319.
  13. GASSER, M., AND MCDERMOTT, E. An architecture for practical delegation in a distributed system. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 1990), pp. 20-30.
  14. HERBISON, B. Low cost outboard cryptographic support for SILS and SP4. In Proceedings of the 13th National Computer Security Conference (Baltimore, Md., Oct. 1990), pp. 286-295.
  15. KOHL, J., NEUMAN, C., AND STEINER, J. The Kerberos network authentication service. Version 5, draft 3, Project Athena, MIT, Cambridge, Mass., Oct. 1990.
  16. LAMPSON, B. Protection. ACM Oper. Syst. Rev. 8, 1 (Jan. 1974), 18-24.
  17. LINN, J. Practical authentication for distributed systems. Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 1990), pp. 31-40.
  18. NATIONAL BUREAU OF STANDARDS. Data Encryption Standard. FIPS Pub. 46, Jan. 1977.
  19. NEEDHAM, R. AND SCHROEDER, M. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12 (Dec. 1978), 993-999.
  20. NEUMAN, C. Proxy-based authorization and accounting for distributed systems. Tech. Rep. 91-02-01, University of Washington, Seattle, Wash., March 1991.
  21. RIVEST, R., SHAMIR, A., AND ADLEMAN, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb. 1978), 120-126.
  22. RIVEST, R. The MD4 message digest algorithm. In Advances in Cryptology --- Crypto ’90, Springer, 1991, pp. 303-311.
  23. RIVEST, R. AND DUSSE, S. The MD5 Message-Digest Algorithm. Internet Draft [MD5-A]: draft-rsadsi-rivest-md5-01.txt, July 1991.
  24. SALTZER, J., REED, D., AND CLARK, D. End-to-end arguments in system design. ACM
    Trans. Comput. Syst. 2, 4 (Nov. 1984), 277-288.
  25. SHAND, M., BERTIN, P., AND VUILLEMIN, J. Resource tradeoffs in fast long integer multiplication. In 2nd ACM Symposium on Parallel Algorithms and Architectures (Crete, July 1990).
  26. STEINER, J., NEUMAN, C., AND SCHILLER, J. Kerberos: An authentication service for open
    network systems. In Proceedings of the Usenix Winter Conference (Berkeley, Calif., Feb. 1988), pp. 191-202.
  27. TARDO, J. AND ALAGAPPAN, K. SPX: Global authentication using public key certificates.
    Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 1991), pp. 232-244.
  28. VOYDOCK, V. AND KENT, S. Security mechanisms in high-level network protocols. ACM Comput. Surv. 15, 2 (Jun. 1983), 135-171.

[7] B. Lampson, M. Abadi, M. Burrows, and T. Wobber. Authentication in distributed systems: Theory and practice.

ACM Transactions on Computer Systems, 10(4):265–310, November 1992. A preliminary version of this paper appeared as [6].
https://www.cs.utexas.edu/~shmat/courses/cs380s/lampson92.pdf

REFERENCES

  1. ABADI, M., BURROWS, M., KAUFMAN, C., AND LAMPSON, B. Authentication and delegation with smart-cards. In Theoretical Aspects of Computer Software, LNCS 526, Springer, 1991, pp. 326-345. Also Res. Rep. 67, Systems Research Center, Digital Equipment Corp., Palo Alto, Calif., Oct. 1990. To appear in Science of Computer Programming.
  2. ABADI, M., BURROWS, M., LAMPSON, B., AND PLOTKIN, G. A calculus for access control in distributed systems. In Advances in Cryptology----- Crypto ’91, LNCS 576, Springer, 1992, pp. 1-23. Also Res. Rep. 70, Systems Research Center, Digital Equipment Corp., Palo Alto, Calif., March 1991. To appear in ACM Trans. Program. Lang. Syst.
  3. BIRRELL, A., LAMPSON, B., NEEDHAM, R., AND SCHROEDER, M. Global authentication without global trust. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 1986), pp. 223-230.
  4. BURROWS, M., ABADI, M., AND NEEDHAM, R. A logic of authentication. ACM Trans. Comput. Syst. 8, 1 (Feb. 1990), 18-36. An expanded version appeared in Proc. Royal Society A 426, 1871 (Dec. 1989), 233-271 and as Res. Rep. 39, Systems Research Center, Digital Equipment Corp., Palo Alto, Calif., Feb. 1989.
  5. CCITT. Information Processing Systems ----- Open Systems Interconnection ----- The Directory Authentication Framework. CCITT 1988 Recommendation X.509. Also ISO/IEC 9594-8:1989.
  6. COMBA, P. Exponentiation cryptosystems on the IBM PC. IBM Syst. J. 28, 4 (Jul. 1990), 526- 538.
    Lampson et al, Authentication in Distributed Systems 45
  7. DAVIS, D. AND SWICK, R. Network security via private-key certificates. ACM Oper. Syst. Rev. 24, 4 (Oct. 1990), 64-67.
  8. DENNING, D. A lattice model of secure information flow. Commun. ACM 19, 5 (May 1976), 236-243.
  9. DEPARTMENT OF DEFENSE. Trusted Computer System Evaluation Criteria. DOD 5200.28- STD, 1985.
  10. DIFFIE, W. AND HELLMAN, M. New directions in cryptography. IEEE Trans. Inf. Theor. IT- 22, 6 (Nov. 1976), 644-654.
  11. EBERLE, H. AND THACKER, C. A 1 Gbit/second GaAs DES chip. In Proceedings of the IEEE 1992 Custom Integrated Circuit Conference (Boston, Mass., May 1992), pp. 19.7.1-19.7.4.
  12. GASSER, M., GOLDSTEIN, A., KAUFMAN, C., AND LAMPSON, B. The Digital distributed sys- tem security architecture. In Proceedings of the 12th National Computer Security Conference (Baltimore, Md., Oct. 1989), pp. 305-319.
  13. GASSER, M., AND MCDERMOTT, E. An architecture for practical delegation in a distributed system. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 1990), pp. 20-30.
  14. HERBISON, B. Low cost outboard cryptographic support for SILS and SP4. In Proceedings of the 13th National Computer Security Conference (Baltimore, Md., Oct. 1990), pp. 286-295.
  15. KOHL, J., NEUMAN, C., AND STEINER, J. The Kerberos network authentication service. Version 5, draft 3, Project Athena, MIT, Cambridge, Mass., Oct. 1990.
  16. LAMPSON, B. Protection. ACM Oper. Syst. Rev. 8, 1 (Jan. 1974), 18-24.
  17. LINN, J. Practical authentication for distributed systems. Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 1990), pp. 31-40.
  18. NATIONAL BUREAU OF STANDARDS. Data Encryption Standard. FIPS Pub. 46, Jan. 1977.
  19. NEEDHAM, R. AND SCHROEDER, M. Using encryption for authentication in large networks
    of computers. Commun. ACM 21, 12 (Dec. 1978), 993-999.
  20. NEUMAN, C. Proxy-based authorization and accounting for distributed systems. Tech. Rep. 91-02-01, University of Washington, Seattle, Wash., March 1991.
  21. RIVEST, R., SHAMIR, A., AND ADLEMAN, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb. 1978), 120-126.
  22. RIVEST, R. The MD4 message digest algorithm. In Advances in Cryptology-----Crypto ’90, Springer, 1991, pp. 303-311.
  23. RIVEST, R. AND DUSSE, S. The MD5 Message-Digest Algorithm. Internet Draft [MD5-A]: draft-rsadsi-rivest-md5-01.txt, July 1991.
  24. SALTZER, J., REED, D., AND CLARK, D. End-to-end arguments in system design. ACM Trans. Comput. Syst. 2, 4 (Nov. 1984), 277-288.
  25. SHAND, M., BERTIN, P., AND VUILLEMIN, J. Resource tradeoffs in fast long integer multiplication. In 2nd ACM Symposium on Parallel Algorithms and Architectures (Crete, July 1990).
  26. STEINER, J., NEUMAN, C., AND SCHILLER, J. Kerberos: An authentication service for open
    network systems. In Proceedings of the Usenix Winter Conference (Berkeley, Calif., Feb. 1988), pp. 191-202.
  27. TARDO, J. AND ALAGAPPAN, K. SPX: Global authentication using public key certificates.
    Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 1991), pp. 232-244.
  28. VOYDOCK, V. AND KENT, S. Security mechanisms in high-level network protocols. ACM Comput. Surv. 15, 2 (Jun. 1983), 135-171.

[8] J. Linn. Generic Security Service Application Program Interface, September 1993. RFC 1508.

Generic Security Service Application Program Interface Version 2, Update 1
https://datatracker.ietf.org/doc/html/rfc2743

8: Referenced Documents

[ISO-7498-2] International Standard ISO 7498-2-1988(E), Security
Architecture.
[ISOIEC-8824] ISO/IEC 8824, "Specification of Abstract Syntax
Notation One (ASN.1)".
[ISOIEC-8825] ISO/IEC 8825, "Specification of Basic Encoding Rules
for Abstract Syntax Notation One (ASN.1)".)
[RFC-1507]: Kaufman, C., "DASS: Distributed Authentication Security
Service", RFC 1507, September 1993.
[RFC-1508]: Linn, J., "Generic Security Service Application Program
Interface", RFC 1508, September 1993.
[RFC-1509]: Wray, J., "Generic Security Service API: C-bindings",
RFC 1509, September 1993.
[RFC-1964]: Linn, J., "The Kerberos Version 5 GSS-API Mechanism",
RFC 1964, June 1996.
[RFC-2025]: Adams, C., "The Simple Public-Key GSS-API Mechanism
(SPKM)", RFC 2025, October 1996.
[RFC-2078]: Linn, J., "Generic Security Service Application Program
Interface, Version 2", RFC 2078, January 1997.
[RFC-2203]: Eisler, M., Chiu, A. and L. Ling, "RPCSEC_GSS Protocol
Specification", RFC 2203, September 1997.
[RFC-2744]: Wray, J., "Generic Security Service API Version 2 :
C-bindings", RFC 2744, January 2000.

[9] R. Molva, G. Tsudik, E. Van Herreweghen, and S. Zatti. KryptoKnight authentication and key distribution system.

In Proceedings of 2nd European Symposium on Research in Computer Security, pages 155–174, Toulouse, France, November 23–25 1992. Springer Verlag.
https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://www.eurecom.fr/publication/378/download/ce-molvre-920101.pdf&ved=2ahUKEwjAqb6NqI6KAxUgr1YBHbRYC9AQFnoECBYQAQ&usg=AOvVaw3h-CGmNniX9hCdGTcTHLfu

References

  1. ANSI Banking - Key Management (Wholesale), ISO 8732 / ANSI X9.17, 1988,.
  2. R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, Systematic Design of Two-Party Authentication Protocols, Proceedings of Crypto'91, August 1991.
  3. R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, Systematic Design of a Family of Attack-Resistant Authentication Protocols, IEEE JSAC Special Issue on Secure Communications, to appear in 1993.
  4. R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, A Modular Family of Secure Protocols for Authentication and Key Distribution Draft, in submission to IEEE/ACM Transactions on Networking, August 1992.
  5. S.M. Bellovin, M. Merritt, Limitations of the Kerberos Authentication System, ACM SIGCOMM Computer Communication Review, October 1990.
  6. W. Di e and M. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, November 1976.
  7. National Bureau of Standards, Federal Information Processing Standards, National Bureau of Standards, Publication 46, 1977.
  8. T. Lomas, L. Gong, J. Saltzer, R. Needham, Reducing Risks from Poorly Chosen Keys, Proceedings of ACM Symposium on Operating System Principles, 1989.
  9. R. Needham and M. Schroeder, Using Encryption for Authentication in Large Networks of Computers, Communications of the ACM, December 1978.
  10. R. Rivest, The MD4 Message Digest Algorithm, Proceedings of CRYPTO'90, August 1990.
  11. R. Rivest, The MD5 Message Digest Algorithm, Internet DRAFT, July 1991.
  12. J. Steiner, The Kerberos Network Authentication Service Overview, MIT Project Athena RFC, Draft 1, April 1989.
  13. J. Steiner, C. Neuman, J. Schiller, Kerberos: An Authentication Service for Open Network Systems, Proceedings of USENIX Winter Conference, February 1988.
  14. J. Linn, Generic Security Service Application Program Interface, Internet Draft, Jun1 1991.
  15. R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Communications of the ACM, February 1978.
  16. G. Tsudik, Message Authentication with One-Way Hash Functions, Proceedings of IEEE INFOCOM 1992. May 1992.

[10] National Bureau of Standards, Washingtion, D.C. Data Encryption Standarad FIPS Pub 46, January 15 1977.

The attached publication, FIPS Publication 46-3
(reaffirmed October 25, 1999), was withdrawn on May 19, 2005 and is provided here only for historical purposes.
https://csrc.nist.gov/files/pubs/fips/46-3/final/docs/fips46-3.pdf

[11] R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers.

Communications of the ACM, 21(12):993–999, December 1978.
https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=63131eb8e91c76c33622954369fc6b3d84fd9a83

References

!. Branstad, D. Security aspects of computer networks, Proc. AIAA Comptr. Network Syst. Conf., April 1973,paper 73-427.
2. Branstad, D. Encryption protection in computer data communications. Proc. Fourth Data Communications Symp., Oct. 1975, pp. 8.1-8.7 (available from ACM, New York).
3. DiMe, W., and Hellman, M. Multiuser Cryptographic Techniques, Proc AFIPS 1976NCC, AFIPS Press, Montvale, N.J., pp. 109-112.
4. Feistel, H. Cryptographic coding for data bank privacy. Res. Rep. RC2827, IBM T.J. Watson Res. Ctr., Yorktown Heights, N.Y., March 1970.
5. Kent, S. Encryption-based protection protocols for interactive user-computer communication, M.S. Th., EECS Dept., M.I.T., 1976; also available as Tech. Rep. 162, Lab. for Comptr. Sci., M.I.T., Cambridge, Mass., 1976.
6. Kent, S. Encryption-based protection for interactive user/ computer communication. Proc. Fifth Data Communication Symp., Sept. 1977,pp. 5-7-5-13 (available from ACM, New York).
7. National Bureau of Standards. Data Encryption Standard. Fed. Inform. Processing Standards Pub. 46, NBS, Washington, D.C., Jan. 1977.
8. Pohlig, S. Algebraic and combinatoric aspects of cryptography. Tech. Rep. No. 6602-1, Stanford Electron. Labs., Stanford, Calif., Oct. 1977.
9. Rivest, R.L., et al. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2 (Feb. 1978), 120-126.

[12] R. Rivest. The MD5 Message-Digest Algorithm, April 1992. RFC 1321.

References

[1] Rivest, R., "The MD4 Message Digest Algorithm", RFC 1320, MIT and
RSA Data Security, Inc., April 1992.
[2] Rivest, R., "The MD4 message digest algorithm", in A.J. Menezes
and S.A. Vanstone, editors, Advances in Cryptology - CRYPTO '90
Proceedings, pages 303-311, Springer-Verlag, 1991.
[3] CCITT Recommendation X.509 (1988), "The Directory -
Authentication Framework."

[13] R.L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120–126, February 1978.

References

  1. Diffie, W., and Hellman, M. New directions in cryptography. IEEE Trans. Inform. Theory IT-22, (Nov. 1976), 644-654.
  2. Diffie, W., and Hellman, M. Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10 (June 1977), 74-84.
  3. Knuth, D. E. The Art of Computer Programming, Vol 2: Seminumerical Algo- rithms. Addison-Wesley, Reading, Mass., 1969.
  4. Levine, J., and Brawley, J.V. Some cryptographic applications of permutation polynomials. Cryptologia 1 (Jan. 1977), 76-92.
  5. Merkle, R. Secure communications over an insecure channel. Submitted to Comm. ACM.
  6. Miller, G.L. Riemann’s hypothesis and tests for primality. Proc. Seventh Annual ACM Symp. on the Theory of Comptng. Albuquerque, New Mex., May 1975, pp. 234-239; extended vers. available as Res. Rep. CS-75-27, Dept. of Comptr. Sci., U. of Waterloo, Waterloo, Ont., Canada, Oct. 1975.
  7. Niven, I., and Zuckerman, H.S. An Introduction to the Theory of Numbers. Wiley, New York, 1972.
  8. Pohlig, S.C., and Hellman, M.E. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. To appear in IEEE Trans. Inform. Theory, 1978.
  9. Pollard, J.M. Theorems on factorization and primality testing. Proc. Camb. Phil. Soc. 76 (1974), 521-528.
  10. Potter, R.J., Electronic mail. Science 195, 4283 (March 1977), 1160-1164.
  11. Rabin, M.O., Probabilistic algorithms. In Algorithms and Complexity, J. F. Traub, Ed., Academic Press, New York, 1976, pp. 21-40.
  12. Solovay, R., and Strassen, V. A Fast Monte-Carlo test for primality. SIAM J. Comptng. (March 1977), 84-85.
  13. Federal Register, Vol. 40, No. 52, March 17, 1975.
  14. Federal Register, Vol. 40, No. 149, August 1, 1975.

[14] W. Rosenberry, D. Kenny, and G. Fisher. Understanding DCE. O’Reilley & Associates, Inc., 1992.

[15] J.G. Steiner, C. Neuman, and J.I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of USENIX Winter Conference, pages 191–202, Dallas, TX, February 1988.

References

  1. S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer, Section E.2.1: Kerberos Authentication and Authorization System, M.I.T. Project Athena, Cambridge, Mas- sachusetts (December 21, 1987).
  2. E. Balkovich, S. R. Lerman, and R. P. Par- melee, ‘‘Computing in Higher Education: The Athena Experience,’’ Communications of the ACM 28(11), pp. 1214-1224, ACM (November, 1985).
  3. R. M. Needham and M. D. Schroeder, ‘‘Using Encryption for Authentication in Large Networks of Computers,’’ Communi- cations of the ACM 21(12), pp.993-999 (December, 1978).
  4. V. L. Voydock and S. T. Kent, ‘‘Security Mechanisms in High-Level Network Protocols,’’ Computing Surveys 15(2), ACM (June 1983).
  5. National Bureau of Standards, ‘‘Data January 12, 1988

[16] Sun Microsystems, Inc. XDR: External Data Representation Standard, June 1987. RFC 1057.

RPC:

Remote Procedure Call Protocol Specification Version 2
https://datatracker.ietf.org/doc/html/rfc1057

REFERENCES

[1] Birrell, A. D. & Nelson, B. J., "Implementing Remote Procedure
Calls", XEROX CSL-83-7, October 1983.
[2] Cheriton, D., "VMTP: Versatile Message Transaction Protocol",
Preliminary Version 0.3, Stanford University, January 1987.
[3] Diffie & Hellman, "New Directions in Cryptography", IEEE
Transactions on Information Theory IT-22, November 1976.
[4] Mills, D., "Network Time Protocol", RFC-958, M/A-COM Linkabit,
September 1985.
[5] National Bureau of Standards, "Data Encryption Standard", Federal
Information Processing Standards Publication 46, January 1977.
[6] Postel, J., "Transmission Control Protocol - DARPA Internet
Program Protocol Specification", RFC-793, Information Sciences
Institute, September 1981.
[7] Postel, J., "User Datagram Protocol", RFC-768, Information
Sciences Institute, August 1980.
[8] Reynolds, J., and Postel, J., "Assigned Numbers", RFC-1010,
Information Sciences Institute, May 1987.
[9] Sun Microsystems, "XDR: External Data Representation Standard",
RFC-1014, June 1987.

XDR:

External Data Representation Standard
https://datatracker.ietf.org/doc/html/rfc4506

12. Normative References

[IEEE] "IEEE Standard for Binary Floating-Point Arithmetic",
ANSI/IEEE Standard 754-1985, Institute of Electrical and
Electronics Engineers, August 1985.

13. Informative References

[KERN] Brian W. Kernighan & Dennis M. Ritchie, "The C Programming
Language", Bell Laboratories, Murray Hill, New Jersey, 1978.
[COHE] Danny Cohen, "On Holy Wars and a Plea for Peace", IEEE
Computer, October 1981.
[COUR] "Courier: The Remote Procedure Call Protocol", XEROX
Corporation, XSIS 038112, December 1981.
[SPAR] "The SPARC Architecture Manual: Version 8", Prentice Hall,
ISBN 0-13-825001-4.
[HPRE] "HP Precision Architecture Handbook", June 1987, 5954-9906.

[17] J.J. Tardo and K. Alagappan. SPX: Global authentication using public key certificates. In Proceedings of 12th IEEE Symposium on Research in Security and Privacy, pages 232–244, Oakland, California, May 20–22 1991.
[18] B. Taylor and D. Goldberg. Secure networking in the Sun environment. In Proceedings of Summer Usenix Conference, pages 28–37, Atlanta, Georgia, June 1986.
[19] E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system. In Proceedings of 14th ACM Symposium on Operating Systems Principles, Ashville, North Carolina, 1993.
[20] T.Y.C. Woo. Authentication and Authorization in Dis- tributed Systems. PhD thesis, Department of Computer Sciences, The University of Texas at Austin, May 1994.
[21] T.Y.C. Woo and S.S. Lam. Authentication for distributed systems. Computer, 25(1):39–52, January 1992.
[22] T.Y.C. Woo and S.S. Lam. “Authentication” revisited. Computer, 25(3):10, March 1992.
[23] T.Y.C.WooandS.S.Lam.Design,verification,andimple- mentation of an authentication protocol. Technical Report TR 93-31, Department of Computer Sciences, The University of Texas at Austin, November 1993.

<この項は書きかけです。順次追記します。>
This article is not completed. I will add some words and/or centences in order.

Qiita Calendar 2024

2024 参加・主催Calendarと投稿記事一覧 Qiita(248)
https://qiita.com/kaizen_nagoya/items/d80b8fbac2496df7827f

主催Calendar2024分析 Qiita(254)
https://qiita.com/kaizen_nagoya/items/15807336d583076f70bc

Calendar 統計
https://qiita.com/kaizen_nagoya/items/e315558dcea8ee3fe43e

Large Language Model Related Calendar
https://qiita.com/kaizen_nagoya/items/3beb0bc3fb71e3ae6d66

LLM 関連 Calendar 2024
https://qiita.com/kaizen_nagoya/items/c36033cf66862d5496fa

LLM コミュニティ参加記録作成予定
https://qiita.com/kaizen_nagoya/items/4840ae09437f1e9df74b

博士論文 Calendar 2024 を開催します。
https://qiita.com/kaizen_nagoya/items/51601357efbcaf1057d0

博士論文(0)関連記事一覧
https://qiita.com/kaizen_nagoya/items/8f223a760e607b705e78

2023 Countdown Calendar 主催・参加一覧
https://qiita.com/kaizen_nagoya/items/c4c2f08ac97f38d08543

自己記事一覧

Qiitaで逆リンクを表示しなくなったような気がする。時々、スマフォで表示するとあらわっることがあり、完全に削除したのではなさそう。

4月以降、せっせとリンクリストを作り、統計を取って確率を説明しようとしている。
2025年2月末を目標にしている。

一覧の一覧( The directory of directories of mine.) Qiita(100)
https://qiita.com/kaizen_nagoya/items/7eb0e006543886138f39

仮説(0)一覧(目標100現在40)
https://qiita.com/kaizen_nagoya/items/f000506fe1837b3590df

Qiita(0)Qiita関連記事一覧(自分)
https://qiita.com/kaizen_nagoya/items/58db5fbf036b28e9dfa6

Error一覧 error(0)
https://qiita.com/kaizen_nagoya/items/48b6cbc8d68eae2c42b8

資料集 [あなたもdocker私もdocker一覧] docker(0)
https://qiita.com/kaizen_nagoya/items/45699eefd62677f69c1d

C++ Support(0) 
https://qiita.com/kaizen_nagoya/items/8720d26f762369a80514

Coding(0) Rules, C, Secure, MISRA and so on
https://qiita.com/kaizen_nagoya/items/400725644a8a0e90fbb0

Ethernet 記事一覧 Ethernet(0)
https://qiita.com/kaizen_nagoya/items/88d35e99f74aefc98794

Wireshark 一覧 wireshark(0)、Ethernet(48)
https://qiita.com/kaizen_nagoya/items/fbed841f61875c4731d0

線網(Wi-Fi)空中線(antenna)(0) 記事一覧(118/300目標)
https://qiita.com/kaizen_nagoya/items/5e5464ac2b24bd4cd001

一覧:携帯計画者日記(0)
https://qiita.com/kaizen_nagoya/items/005d38c6f55c85570e74

なぜdockerで機械学習するか 書籍・ソース一覧作成中 (目標100)
https://qiita.com/kaizen_nagoya/items/ddd12477544bf5ba85e2

プログラムちょい替え(0)一覧:4件
https://qiita.com/kaizen_nagoya/items/296d87ef4bfd516bc394

言語処理100本ノックをdockerで。python覚えるのに最適。:10+12
https://qiita.com/kaizen_nagoya/items/7e7eb7c543e0c18438c4

Python(0)記事をまとめたい。
https://qiita.com/kaizen_nagoya/items/088c57d70ab6904ebb53

安全(0)安全工学シンポジウムに向けて: 21
https://qiita.com/kaizen_nagoya/items/c5d78f3def8195cb2409

プログラマによる、プログラマのための、統計(0)と確率のプログラミングとその後
https://qiita.com/kaizen_nagoya/items/6e9897eb641268766909

転職(0)一覧
https://qiita.com/kaizen_nagoya/items/f77520d378d33451d6fe

物理記事 上位100
https://qiita.com/kaizen_nagoya/items/66e90fe31fbe3facc6ff

量子(0) 計算機, 量子力学
https://qiita.com/kaizen_nagoya/items/1cd954cb0eed92879fd4

数学関連記事100
https://qiita.com/kaizen_nagoya/items/d8dadb49a6397e854c6d

統計(0)一覧
https://qiita.com/kaizen_nagoya/items/80d3b221807e53e88aba

図(0) state, sequence and timing. UML and お絵描き
https://qiita.com/kaizen_nagoya/items/60440a882146aeee9e8f

品質一覧
https://qiita.com/kaizen_nagoya/items/2b99b8e9db6d94b2e971

言語・文学記事 100
https://qiita.com/kaizen_nagoya/items/42d58d5ef7fb53c407d6

医工連携関連記事一覧
https://qiita.com/kaizen_nagoya/items/6ab51c12ba51bc260a82

自動車 記事 100
https://qiita.com/kaizen_nagoya/items/f7f0b9ab36569ad409c5

通信記事100
https://qiita.com/kaizen_nagoya/items/1d67de5e1cd207b05ef7

日本語(0)一欄
https://qiita.com/kaizen_nagoya/items/7498dcfa3a9ba7fd1e68

英語(0) 一覧
https://qiita.com/kaizen_nagoya/items/680e3f5cbf9430486c7d

音楽 一覧(0)
https://qiita.com/kaizen_nagoya/items/b6e5f42bbfe3bbe40f5d

@kazuo_reve 新人の方によく展開している有益な情報」確認一覧
https://qiita.com/kaizen_nagoya/items/b9380888d1e5a042646b

鉄道(0)鉄道のシステム考察はてっちゃんがてつだってくれる
https://qiita.com/kaizen_nagoya/items/faa4ea03d91d901a618a

OSEK OS設計の基礎 OSEK(100)
https://qiita.com/kaizen_nagoya/items/7528a22a14242d2d58a3

coding (101) 一覧を作成し始めた。omake:最近のQiitaで表示しない5つの事象
https://qiita.com/kaizen_nagoya/items/20667f09f19598aedb68

官公庁・学校・公的団体(NPOを含む)システムの課題、官(0)
https://qiita.com/kaizen_nagoya/items/04ee6eaf7ec13d3af4c3

「はじめての」シリーズ  ベクタージャパン 
https://qiita.com/kaizen_nagoya/items/2e41634f6e21a3cf74eb

AUTOSAR(0)Qiita記事一覧, OSEK(75)
https://qiita.com/kaizen_nagoya/items/89c07961b59a8754c869

プログラマが知っていると良い「公序良俗」
https://qiita.com/kaizen_nagoya/items/9fe7c0dfac2fbd77a945

LaTeX(0) 一覧 
https://qiita.com/kaizen_nagoya/items/e3f7dafacab58c499792

自動制御、制御工学一覧(0)
https://qiita.com/kaizen_nagoya/items/7767a4e19a6ae1479e6b

Rust(0) 一覧 
https://qiita.com/kaizen_nagoya/items/5e8bb080ba6ca0281927

関連資料

' @kazuo_reve 私が効果を確認した「小川メソッド」
https://qiita.com/kazuo_reve/items/a3ea1d9171deeccc04da

' @kazuo_reve 新人の方によく展開している有益な情報
https://qiita.com/kazuo_reve/items/d1a3f0ee48e24bba38f1

' @kazuo_reve Vモデルについて勘違いしていたと思ったこと
https://qiita.com/kazuo_reve/items/46fddb094563bd9b2e1e

Engineering Festa 2024前に必読記事一覧

programの本質は計画だ。programは設計だ。
https://qiita.com/kaizen_nagoya/items/c8545a769c246a458c27

登壇直後版 色使い(JIS安全色) Qiita Engineer Festa 2023〜私しか得しないニッチな技術でLT〜 スライド編 0.15
https://qiita.com/kaizen_nagoya/items/f0d3070d839f4f735b2b

プログラマが知っていると良い「公序良俗」
https://qiita.com/kaizen_nagoya/items/9fe7c0dfac2fbd77a945

逆も真:社会人が最初に確かめるとよいこと。OSEK(69)、Ethernet(59)
https://qiita.com/kaizen_nagoya/items/39afe4a728a31b903ddc

統計の嘘。仮説(127)
https://qiita.com/kaizen_nagoya/items/63b48ecf258a3471c51b

連休中の記事数は目標達成した。質向上のために集計。平均が無意味なことを再確認
https://qiita.com/kaizen_nagoya/items/138c543c5e74e380d31d

自分の言葉だけで論理展開できるのが天才なら、文章の引用だけで論理展開できるのが秀才だ。仮説(136)
https://qiita.com/kaizen_nagoya/items/97cf07b9e24f860624dd

参考文献駆動執筆(references driven writing)・デンソークリエイト編
https://qiita.com/kaizen_nagoya/items/b27b3f58b8bf265a5cd1

「何を」よりも「誰を」。10年後のために今見習いたい人たち
https://qiita.com/kaizen_nagoya/items/8045978b16eb49d572b2

Qiitaの記事に3段階または5段階で到達するための方法
https://qiita.com/kaizen_nagoya/items/6e9298296852325adc5e

出力(output)と呼ばないで。これは状態(state)です。
https://qiita.com/kaizen_nagoya/items/80b8b5913b2748867840

coding (101) 一覧を作成し始めた。omake:最近のQiitaで表示しない5つの事象
https://qiita.com/kaizen_nagoya/items/20667f09f19598aedb68

あなたは「勘違いまとめ」から、勘違いだと言っていることが勘違いだといくつ見つけられますか。人間の間違い(human error(125))の種類と対策
https://qiita.com/kaizen_nagoya/items/ae391b77fffb098b8fb4

プログラマの「プログラムが書ける」思い込みは強みだ。3つの理由。仮説(168)統計と確率(17) , OSEK(79)
https://qiita.com/kaizen_nagoya/items/bc5dd86e414de402ec29

出力(output)と呼ばないで。これは状態(state)です。
https://qiita.com/kaizen_nagoya/items/80b8b5913b2748867840

これからの情報伝達手段の在り方について考えてみよう。炎上と便乗。
https://qiita.com/kaizen_nagoya/items/71a09077ac195214f0db

ISO/IEC JTC1 SC7 Software and System Engineering
https://qiita.com/kaizen_nagoya/items/48b43f0f6976a078d907

アクセシビリティの知見を発信しよう!(再び)
https://qiita.com/kaizen_nagoya/items/03457eb9ee74105ee618

統計論及確率論輪講(再び)
https://qiita.com/kaizen_nagoya/items/590874ccfca988e85ea3

読者の心をグッと惹き寄せる7つの魔法
https://qiita.com/kaizen_nagoya/items/b1b5e89bd5c0a211d862

@kazuo_reve 新人の方によく展開している有益な情報」確認一覧
https://qiita.com/kaizen_nagoya/items/b9380888d1e5a042646b

ソースコードで議論しよう。日本語で議論するの止めましょう(あるプログラミング技術の議論報告)
https://qiita.com/kaizen_nagoya/items/8b9811c80f3338c6c0b0

脳内コンパイラの3つの危険
https://qiita.com/kaizen_nagoya/items/7025cf2d7bd9f276e382

心理学の本を読むよりはコンパイラ書いた方がよくね。仮説(34)
https://qiita.com/kaizen_nagoya/items/fa715732cc148e48880e

NASAを超えるつもりがあれば読んでください。
https://qiita.com/kaizen_nagoya/items/e81669f9cb53109157f6

データサイエンティストの気づき!「勉強して仕事に役立てない人。大嫌い!!」『それ自分かも?』ってなった!!!
https://qiita.com/kaizen_nagoya/items/d85830d58d8dd7f71d07

「ぼくの好きな先生」「人がやらないことをやれ」プログラマになるまで。仮説(37) 
https://qiita.com/kaizen_nagoya/items/53e4bded9fe5f724b3c4

なぜ経済学徒を辞め、計算機屋になったか(経済学部入学前・入学後・卒業後対応) 転職(1)
https://qiita.com/kaizen_nagoya/items/06335a1d24c099733f64

プログラミング言語教育のXYZ。 仮説(52)
https://qiita.com/kaizen_nagoya/items/1950c5810fb5c0b07be4

【24卒向け】9ヶ月後に年収1000万円を目指す。二つの関門と三つの道。
https://qiita.com/kaizen_nagoya/items/fb5bff147193f726ad25

「【25卒向け】Qiita Career Meetup for STUDENT」予習の勧め
https://qiita.com/kaizen_nagoya/items/00eadb8a6e738cb6336f

大学入試不合格でも筆記試験のない大学に入って卒業できる。卒業しなくても博士になれる。
https://qiita.com/kaizen_nagoya/items/74adec99f396d64b5fd5

全世界の不登校の子供たち「博士論文」を書こう。世界子供博士論文遠隔実践中心 安全(99)
https://qiita.com/kaizen_nagoya/items/912d69032c012bcc84f2

小川メソッド 覚え(書きかけ)
https://qiita.com/kaizen_nagoya/items/3593d72eca551742df68

DoCAP(ドゥーキャップ)って何ですか?
https://qiita.com/kaizen_nagoya/items/47e0e6509ab792c43327

views 20,000越え自己記事一覧
https://qiita.com/kaizen_nagoya/items/58e8bd6450957cdecd81

Views1万越え、もうすぐ1万記事一覧 最近いいねをいただいた213記事
https://qiita.com/kaizen_nagoya/items/d2b805717a92459ce853

amazon 殿堂入りNo1レビュアになるまで。仮説(102)
https://qiita.com/kaizen_nagoya/items/83259d18921ce75a91f4

100以上いいねをいただいた記事16選
https://qiita.com/kaizen_nagoya/items/f8d958d9084ffbd15d2a

小川清最終講義、最終講義(再)計画, Ethernet(100) 英語(100) 安全(100)
https://qiita.com/kaizen_nagoya/items/e2df642e3951e35e6a53

<この記事は個人の過去の経験に基づく個人の感想です。現在所属する組織、業務とは関係がありません。>
This article is an individual impression based on my individual experience. It has nothing to do with the organization or business to which I currently belong.

文書履歴(document history)

ver. 0.01 初稿  20241204

最後までおよみいただきありがとうございました。

いいね 💚、フォローをお願いします。

Thank you very much for reading to the last sentence.

Please press the like icon 💚 and follow me for your happy life.

0
1
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?