Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings

碩士 === 長庚大學 === 資訊管理學研究所 === 97 === With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of t...

Full description

Bibliographic Details
Main Authors: Chih Wei Chu, 朱志偉
Other Authors: 許建隆
Format: Others
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/15859437104079794941