Using Elliptic Curve Cryptography on Secure Electronic Transaction
碩士 === 育達商業技術學院 === 資訊管理所 === 92 === In the times of network, we face threats from virus, hacker, electronic eavesdropper, and electronic deceiver. The safety is true of important. The growth of the computer system and network makes the organizations and personal users to depend on the information t...
Main Author: | 顏如慧 |
---|---|
Other Authors: | 黃柏翔 |
Format: | Others |
Language: | en_US |
Published: |
2004
|
Online Access: | http://ndltd.ncl.edu.tw/handle/89633678710067074172 |
Similar Items
-
A Secure Electronic Voting Scheme with Elliptic Curve Cryptography
by: Wen-Sheng Chuang, et al.
Published: (2007) -
Authentication and Group Secure Communications Using Elliptic Curve Cryptography
by: Shyi-Tsong Wu, et al.
Published: (2005) -
Software elliptic curve cryptography
by: Khabbazian, Majid.
Published: (2008) -
Algorithms in Elliptic Curve Cryptography
by: Hutchinson, Aaron
Published: (2019) -
Elliptic Curves and their Applications to Cryptography
by: Bathgate, Jonathan
Published: (2007)