Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings
碩士 === 長庚大學 === 資訊管理學研究所 === 97 === With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of t...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/15859437104079794941 |