Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings
碩士 === 長庚大學 === 資訊管理研究所 === 98 === With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of th...
Main Authors: | Chu Chih-Wei, 朱志偉 |
---|---|
Other Authors: | 許建隆 |
Format: | Others |
Language: | en_US |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/75214608248583788202 |
Similar Items
-
Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings
by: Chih Wei Chu, et al.
Published: (2009) -
Authenticated Key Agreement Protocol with Privacy Preservation
by: Liang-Peng Chang, et al.
Published: (2010) -
User Authentication Protocols with Three Factors and Key Agreement
by: Chen Chih Cheng, et al.
Published: (2008) -
A Privacy-Preserving Authentication and Key Agreement Scheme with Deniability for IoT
by: Yousheng Zhou, et al.
Published: (2019-04-01) -
Authentication and Key Agreement in Various Communication Environments for User Privacy Protection
by: Ren-Chiun Wang, et al.
Published: (2010)