完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Ju, Shu-Chung | |
dc.contributor.author | Wang, Sheng-De | |
dc.date.accessioned | 2009-08-23T04:40:09Z | |
dc.date.accessioned | 2020-05-25T06:24:36Z | - |
dc.date.available | 2009-08-23T04:40:09Z | |
dc.date.available | 2020-05-25T06:24:36Z | - |
dc.date.issued | 2006-10-20T01:27:36Z | |
dc.date.submitted | 1998-12-17 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/2029 | - |
dc.description.abstract | A key establishment protocol is to establish a session key among all of the communication parties in a computer network, so that they can use the session key to secure the subsequent messages in the session. Most existing keyestablishment protocols assume a specific network environment and are not subject to to a systematic design approach. In this paper, we ananlyzed the essentials of key establishment procedure, and proposed a systematci method to design key establishment protocols. The salient features of it include clarifying security achievements, capability of identifying potential efficiency, adaptability to diverse network environments and generalized authentication environments, and easy applicability. | |
dc.description.sponsorship | 成功大學,台南市 | |
dc.format.extent | 7p. | |
dc.format.extent | 644315 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | zh_TW | |
dc.relation.ispartofseries | 1998 ICS會議 | |
dc.subject.other | Security Protocols & Others | |
dc.title | A SYSTEMATIC METHOD FOR DESIGN OF KEY ESTABLISHMENT PROTOCOLS | |
分類: | 1998年 ICS 國際計算機會議 |
文件中的檔案:
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
ce07ics001998000097.pdf | 629.21 kB | Adobe PDF | 檢視/開啟 |
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。