Secure Ad-Hoc Transactions Protected By Hierarchical Identity-Based Public Key Cryptography
碩士 === 國立交通大學 === 資訊學院碩士在職專班資訊組 === 96 === ID-based PKI Technology can reduce the huge cost of certificate management and reduce the dependence of directory server for public key & certificate search. Hierarchical ID-based PKI Technology can not only share the heavy load bottleneck of singl...
Main Authors: | Chung-Ping Lee, 李仲平 |
---|---|
Other Authors: | John Kar-kin Zao |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/63077667288177047549 |
Similar Items
-
Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey
by: Mahmood A. Al-Shareeda, et al.
Published: (2021-01-01) -
A Hierarchical Key Management Scheme of Secure Group for Mobile Ad Hoc Networks
by: Shian-Zhang Fang, et al.
Published: (2005) -
On the Security of Leakage Resilient Public Key Cryptography
by: Brydon, Dale
Published: (2012) -
On the Security of Leakage Resilient Public Key Cryptography
by: Brydon, Dale
Published: (2012) -
Cryptography on the public key crypto systems and data security
by: LAI, XI-SONG, et al.
Published: (1990)