完整後設資料紀錄
DC 欄位語言
dc.contributor.authorChen, Bing-Chang
dc.contributor.authorSun, Hung-Min
dc.contributor.authorHwang, Tzone-Lih
dc.date.accessioned2009-06-02T06:19:09Z
dc.date.accessioned2020-05-25T06:37:58Z-
dc.date.available2009-06-02T06:19:09Z
dc.date.available2020-05-25T06:37:58Z-
dc.date.issued2006-10-27T06:12:56Z
dc.date.submitted2000-12-08
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/2685-
dc.description.abstractKey exchange protocol is important for sending secret messages using the session key between two parties. In order to reach the objective, the premise is to generate a session key securely. Encryption key exchange was first proposed to generate a session key with a weak authenticated password against guessing attacks. Next, another authenticated key exchange protocols for three-party, two clients who request the session key and one server who authenticates the user’s identity and assists in generating a session key, were proposed. Once the clients are under diverse circumstances, they have to be authenticate by their own server. That is, it needs four-party to complete this protocol. In this paper, we focus on the four-party authenticated key exchange protocol, and presents four-party EKE.
dc.description.sponsorship中正大學,嘉義縣
dc.format.extent4p.
dc.format.extent39830 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2000 ICS會議
dc.subject.otherGroup-Oriented Cryptosystem
dc.titleFour-Party Encryption Key Exchange
分類:2000年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002000000081.pdf38.9 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。