Software-Only Authentication Protocols based on Cryptographic Camouflage Techniques

碩士 === 輔仁大學 === 資訊工程學系 === 91 === As the increasing uses of public-key cryptography in authentication and signature, the need of a secure, convenient, and economic mechanism for protecting the user's private key is more common than before. Storing the private ke...

Full description

Bibliographic Details
Main Author: 李惠龍
Other Authors: 顧維祺
Format: Others
Language:en_US
Published: 2003
Online Access:http://ndltd.ncl.edu.tw/handle/19970319264016063644