Key escrow system in mobile communication network

被引:0
|
作者
Tang, Hai-Feng
Li, Ying-Chun
Feng, Ling
Lin, Kang-Hong
Lu, Qiang
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] On the key recovery of the Key Escrow System
    Lee, YC
    Laih, CS
    13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 216 - 220
  • [3] Key escrow system for network environment based on RSA algorithm
    Yang, Bo
    Wang, Yumin
    Dianzi Kexue Xuekan/Journal of Electronics, 2000, 22 (02): : 194 - 197
  • [4] On the key escrow system without key exchange
    Lee, Yung-Cheng
    Laih, Chi-Sung
    Computers and Electrical Engineering, 1999, 25 (04): : 279 - 290
  • [5] On the key escrow system without key exchange
    Lee, YC
    Laih, CS
    COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (04) : 279 - 290
  • [6] A key escrow system of the RSA cryptosystem
    Sameshima, Y
    INFORMATION SECURITY, 1998, 1396 : 135 - 146
  • [7] A key escrow system with warrant bounds
    Lenstra, AK
    Winkler, P
    Yacobi, Y
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 197 - 207
  • [8] A public-key-based key escrow system
    Nechvatal, J
    JOURNAL OF SYSTEMS AND SOFTWARE, 1996, 35 (01) : 73 - 83
  • [9] Key escrow
    Balch, T
    COMMUNICATIONS OF THE ACM, 1996, 39 (07) : 24 - 24
  • [10] Key management and key distribution for secure group communication in mobile and cloud network
    Vijayakumar, P.
    Chang, Victor
    Deborah, L. Jegatha
    Kshatriya, Bharat S. Rawal
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 123 - 125