A Study of Public Key Authentication Schemes

碩士 === 國立中興大學 === 資訊科學研究所 === 85 === Verifying the legitimacy of an individual*s public key is very importantin public-key cryptosystems. Most key authentication schemes require one ormore trustworthy authorities to authenticate the key...

Full description

Bibliographic Details
Main Authors: Yang, Chuan-Sheng, 楊傳聖
Other Authors: Horng Gwoboa
Format: Others
Language:zh-TW
Published: 1997
Online Access:http://ndltd.ncl.edu.tw/handle/15102188641814862416