Applied hardware with Data cryptography

碩士 === 國立交通大學 === 資訊工程系所 === 92 === In this thesis, we propose that ubiquitously and popularly portable E-book nowadays include function of data cryptographic process. When vendor that provides portable E-book would support more information to user that owns the E-book, the information can be encryp...

Full description

Bibliographic Details
Main Author: 何明俞
Other Authors: 葉義雄
Format: Others
Language:en_US
Published: 2004
Online Access:http://ndltd.ncl.edu.tw/handle/73398055542452235403
id ndltd-TW-092NCTU5392057
record_format oai_dc
spelling ndltd-TW-092NCTU53920572015-10-13T13:04:22Z http://ndltd.ncl.edu.tw/handle/73398055542452235403 Applied hardware with Data cryptography 具加解密資料的應用硬體 何明俞 碩士 國立交通大學 資訊工程系所 92 In this thesis, we propose that ubiquitously and popularly portable E-book nowadays include function of data cryptographic process. When vendor that provides portable E-book would support more information to user that owns the E-book, the information can be encrypted in advance and located on Internet. User who owns E-book device downloads the encrypted-data and recovery the information with embedded key corresponding the E-book device. In addition, user can also locally process data cryptography by user-defined key from external inputting. Except users who own the device within embedded key, end-user wouldn’t decrypt ciphertext from plaintext. In hardware implementation, we take common components and combine them to become device that has basic functions of storage, displaying, communication, cryptographic process. The device will simulate our applied assumption and basic functions that E-book include. 葉義雄 2004 學位論文 ; thesis 48 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 資訊工程系所 === 92 === In this thesis, we propose that ubiquitously and popularly portable E-book nowadays include function of data cryptographic process. When vendor that provides portable E-book would support more information to user that owns the E-book, the information can be encrypted in advance and located on Internet. User who owns E-book device downloads the encrypted-data and recovery the information with embedded key corresponding the E-book device. In addition, user can also locally process data cryptography by user-defined key from external inputting. Except users who own the device within embedded key, end-user wouldn’t decrypt ciphertext from plaintext. In hardware implementation, we take common components and combine them to become device that has basic functions of storage, displaying, communication, cryptographic process. The device will simulate our applied assumption and basic functions that E-book include.
author2 葉義雄
author_facet 葉義雄
何明俞
author 何明俞
spellingShingle 何明俞
Applied hardware with Data cryptography
author_sort 何明俞
title Applied hardware with Data cryptography
title_short Applied hardware with Data cryptography
title_full Applied hardware with Data cryptography
title_fullStr Applied hardware with Data cryptography
title_full_unstemmed Applied hardware with Data cryptography
title_sort applied hardware with data cryptography
publishDate 2004
url http://ndltd.ncl.edu.tw/handle/73398055542452235403
work_keys_str_mv AT hémíngyú appliedhardwarewithdatacryptography
AT hémíngyú jùjiājiěmìzīliàodeyīngyòngyìngtǐ
_version_ 1717729737575497728