Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings

碩士 === 長庚大學 === 資訊管理研究所 === 98 === With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of th...

Full description

Bibliographic Details
Main Authors: Chu Chih-Wei, 朱志偉
Other Authors: 許建隆
Format: Others
Language:en_US
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/75214608248583788202

Similar Items