Secure Ad-Hoc Transactions Protected By Hierarchical Identity-Based Public Key Cryptography
碩士 === 國立交通大學 === 資訊學院碩士在職專班資訊組 === 96 === ID-based PKI Technology can reduce the huge cost of certificate management and reduce the dependence of directory server for public key & certificate search. Hierarchical ID-based PKI Technology can not only share the heavy load bottleneck of singl...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/63077667288177047549 |
id |
ndltd-TW-096NCTU5392023 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096NCTU53920232015-11-09T04:04:58Z http://ndltd.ncl.edu.tw/handle/63077667288177047549 Secure Ad-Hoc Transactions Protected By Hierarchical Identity-Based Public Key Cryptography 利用階層化基於身份公開金鑰密碼系統保護隨意自組網安全資料交換 Chung-Ping Lee 李仲平 碩士 國立交通大學 資訊學院碩士在職專班資訊組 96 ID-based PKI Technology can reduce the huge cost of certificate management and reduce the dependence of directory server for public key & certificate search. Hierarchical ID-based PKI Technology can not only share the heavy load bottleneck of single PKG in a scalable network environment but also compatible with hierarchical structure of human organization. When we want use HIDPKI technology, the previous security services & protocols must be modified. In this thesis we propose the HIBC technology in HIDPKI System at the Mutual Authentication, Key Agreement, Secure Data Transaction Mechanisms; application for SSL/TLS, IEEE 802.1X, 802.11i Protocols, and try to improve the weakness of protocol. John Kar-kin Zao 邵家健 2009 學位論文 ; thesis 48 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 資訊學院碩士在職專班資訊組 === 96 === ID-based PKI Technology can reduce the huge cost of certificate management and reduce the dependence of directory server for public key & certificate search. Hierarchical ID-based PKI Technology can not only share the heavy load bottleneck of single PKG in a scalable network environment but also compatible with hierarchical structure of human organization. When we want use HIDPKI technology, the previous security services & protocols must be modified. In this thesis we propose the HIBC technology in HIDPKI System at the Mutual Authentication, Key Agreement, Secure Data Transaction Mechanisms; application for SSL/TLS, IEEE 802.1X, 802.11i Protocols, and try to improve the weakness of protocol.
|
author2 |
John Kar-kin Zao |
author_facet |
John Kar-kin Zao Chung-Ping Lee 李仲平 |
author |
Chung-Ping Lee 李仲平 |
spellingShingle |
Chung-Ping Lee 李仲平 Secure Ad-Hoc Transactions Protected By Hierarchical Identity-Based Public Key Cryptography |
author_sort |
Chung-Ping Lee |
title |
Secure Ad-Hoc Transactions Protected By Hierarchical Identity-Based Public Key Cryptography |
title_short |
Secure Ad-Hoc Transactions Protected By Hierarchical Identity-Based Public Key Cryptography |
title_full |
Secure Ad-Hoc Transactions Protected By Hierarchical Identity-Based Public Key Cryptography |
title_fullStr |
Secure Ad-Hoc Transactions Protected By Hierarchical Identity-Based Public Key Cryptography |
title_full_unstemmed |
Secure Ad-Hoc Transactions Protected By Hierarchical Identity-Based Public Key Cryptography |
title_sort |
secure ad-hoc transactions protected by hierarchical identity-based public key cryptography |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/63077667288177047549 |
work_keys_str_mv |
AT chungpinglee secureadhoctransactionsprotectedbyhierarchicalidentitybasedpublickeycryptography AT lǐzhòngpíng secureadhoctransactionsprotectedbyhierarchicalidentitybasedpublickeycryptography AT chungpinglee lìyòngjiēcénghuàjīyúshēnfèngōngkāijīnyàomìmǎxìtǒngbǎohùsuíyìzìzǔwǎngānquánzīliàojiāohuàn AT lǐzhòngpíng lìyòngjiēcénghuàjīyúshēnfèngōngkāijīnyàomìmǎxìtǒngbǎohùsuíyìzìzǔwǎngānquánzīliàojiāohuàn |
_version_ |
1718126542648770560 |