The Study of User Authentication and Key Agreement Protocols Based on Extended Chaotic Maps

碩士 === 輔仁大學 === 圖書資訊學系碩士班 === 101 === Due to the rapid development and growth of computer network, many people use email or messenger software to communicate with each other through the public network. Nevertheless, the computer network is an insecure shared platform since it may vulnerable to some...

Full description

Bibliographic Details
Main Authors: Che-Wei Hsu, 許哲維
Other Authors: Cheng-Chi Lee
Format: Others
Language:en_US
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/78982000384575196211

Similar Items