The Study and Implementations of Certificates in PKI
博士 === 國立成功大學 === 電機工程學系碩博士班 === 93 === Nowadays public key cryptography has been applied to daily life to achieve privacy, authenticity,integrity, and nonrepudiation in network communication. In the use of a public key system, user A first generates his/her public/private key pairs, and then user...
Main Authors: | Kun-Yuan Chen, 陳坤元 |
---|---|
Other Authors: | Chi Sung Laih |
Format: | Others |
Language: | en_US |
Published: |
2004
|
Online Access: | http://ndltd.ncl.edu.tw/handle/85298400564454741387 |
Similar Items
-
A survey and security strength classification of PKI certificate revocation management implementations
by: MacMichael, John L.
Published: (2012) -
The Design of Methodology for Keys and Certificate in PKI Security Evaluation
by: Kao Meng-Fu, et al.
Published: (2001) -
Live CA: Design and Implementation of PKI Certificate Authority System using IC cards
by: Pei Chi Cheng, et al.
Published: (2005) -
Digital Signature for data and documents using operating PKI certificates
by: El Mane Adil, et al.
Published: (2021-01-01) -
Research and Implementation of PKI for Public WLAN
by: 楊宜倩
Published: (2004)