完整後設資料紀錄
DC 欄位語言
dc.contributor.authorJu, Shu-Chung
dc.contributor.authorWang, Sheng-De
dc.date.accessioned2009-08-23T04:40:09Z
dc.date.accessioned2020-05-25T06:24:36Z-
dc.date.available2009-08-23T04:40:09Z
dc.date.available2020-05-25T06:24:36Z-
dc.date.issued2006-10-20T01:27:36Z
dc.date.submitted1998-12-17
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/2029-
dc.description.abstractA key establishment protocol is to establish a session key among all of the communication parties in a computer network, so that they can use the session key to secure the subsequent messages in the session. Most existing keyestablishment protocols assume a specific network environment and are not subject to to a systematic design approach. In this paper, we ananlyzed the essentials of key establishment procedure, and proposed a systematci method to design key establishment protocols. The salient features of it include clarifying security achievements, capability of identifying potential efficiency, adaptability to diverse network environments and generalized authentication environments, and easy applicability.
dc.description.sponsorship成功大學,台南市
dc.format.extent7p.
dc.format.extent644315 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries1998 ICS會議
dc.subject.otherSecurity Protocols & Others
dc.titleA SYSTEMATIC METHOD FOR DESIGN OF KEY ESTABLISHMENT PROTOCOLS
分類:1998年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics001998000097.pdf629.21 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。