A Study of Public Key Authentication Schemes
碩士 === 國立中興大學 === 資訊科學研究所 === 85 === Verifying the legitimacy of an individual*s public key is very importantin public-key cryptosystems. Most key authentication schemes require one ormore trustworthy authorities to authenticate the key...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
1997
|
Online Access: | http://ndltd.ncl.edu.tw/handle/15102188641814862416 |