Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings
碩士 === 長庚大學 === 資訊管理研究所 === 98 === With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of th...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/75214608248583788202 |