Secure Authentication Protocols and Their Applications
博士 === 國立清華大學 === 資訊工程學系 === 101 === With the rapid development of network and information technologies and the continuing growth of the online population, more and more commercial enterprises are supporting online transactions. However, due to the digitization of information, it is easy for malicio...
Main Authors: | Cheng, Ting-Fang, 鄭婷方 |
---|---|
Other Authors: | Chang, Chin-Chen |
Format: | Others |
Language: | en_US |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/12273453597835793184 |
Similar Items
-
On the security of authentication protocols on the web
by: Delignat-Lavaud, Antoine
Published: (2016) -
Authentication Test-Based the RFID Authentication Protocol with Security Analysis
by: Minghui Wang, et al.
Published: (2014-08-01) -
Automatic validation of secure authentication protocols
by: Kim, Kyoil, 1964-
Published: (2011) -
On the Secure Authentication protocol of WWW Service
by: Ming-Chiang Chen, et al.
Published: (1995) -
Hardware and protocols for authentication and secure computation
by: Juvekar, Chiraag (Chiraag Shashikant)
Published: (2018)