Applied hardware with Data cryptography
碩士 === 國立交通大學 === 資訊工程系所 === 92 === In this thesis, we propose that ubiquitously and popularly portable E-book nowadays include function of data cryptographic process. When vendor that provides portable E-book would support more information to user that owns the E-book, the information can be encryp...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2004
|
Online Access: | http://ndltd.ncl.edu.tw/handle/73398055542452235403 |
id |
ndltd-TW-092NCTU5392057 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-092NCTU53920572015-10-13T13:04:22Z http://ndltd.ncl.edu.tw/handle/73398055542452235403 Applied hardware with Data cryptography 具加解密資料的應用硬體 何明俞 碩士 國立交通大學 資訊工程系所 92 In this thesis, we propose that ubiquitously and popularly portable E-book nowadays include function of data cryptographic process. When vendor that provides portable E-book would support more information to user that owns the E-book, the information can be encrypted in advance and located on Internet. User who owns E-book device downloads the encrypted-data and recovery the information with embedded key corresponding the E-book device. In addition, user can also locally process data cryptography by user-defined key from external inputting. Except users who own the device within embedded key, end-user wouldn’t decrypt ciphertext from plaintext. In hardware implementation, we take common components and combine them to become device that has basic functions of storage, displaying, communication, cryptographic process. The device will simulate our applied assumption and basic functions that E-book include. 葉義雄 2004 學位論文 ; thesis 48 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 資訊工程系所 === 92 === In this thesis, we propose that ubiquitously and popularly portable E-book nowadays include function of data cryptographic process. When vendor that provides portable E-book would support more information to user that owns the E-book, the information can be encrypted in advance and located on Internet. User who owns E-book device downloads the encrypted-data and recovery the information with embedded key corresponding the E-book device. In addition, user can also locally process data cryptography by user-defined key from external inputting. Except users who own the device within embedded key, end-user wouldn’t decrypt ciphertext from plaintext.
In hardware implementation, we take common components and combine them to become device that has basic functions of storage, displaying, communication, cryptographic process. The device will simulate our applied assumption and basic functions that E-book include.
|
author2 |
葉義雄 |
author_facet |
葉義雄 何明俞 |
author |
何明俞 |
spellingShingle |
何明俞 Applied hardware with Data cryptography |
author_sort |
何明俞 |
title |
Applied hardware with Data cryptography |
title_short |
Applied hardware with Data cryptography |
title_full |
Applied hardware with Data cryptography |
title_fullStr |
Applied hardware with Data cryptography |
title_full_unstemmed |
Applied hardware with Data cryptography |
title_sort |
applied hardware with data cryptography |
publishDate |
2004 |
url |
http://ndltd.ncl.edu.tw/handle/73398055542452235403 |
work_keys_str_mv |
AT hémíngyú appliedhardwarewithdatacryptography AT hémíngyú jùjiājiěmìzīliàodeyīngyòngyìngtǐ |
_version_ |
1717729737575497728 |