Software-Only Authentication Protocols based on Cryptographic Camouflage Techniques
碩士 === 輔仁大學 === 資訊工程學系 === 91 === As the increasing uses of public-key cryptography in authentication and signature, the need of a secure, convenient, and economic mechanism for protecting the user's private key is more common than before. Storing the private ke...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/19970319264016063644 |