Key escrow system in mobile communication network

被引:0
|
作者
Tang, Hai-Feng
Li, Ying-Chun
Feng, Ling
Lin, Kang-Hong
Lu, Qiang
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Crypto backup and key escrow
    Maher, DP
    COMMUNICATIONS OF THE ACM, 1996, 39 (03) : 48 - 53
  • [22] On solutions to the key escrow problem
    Hoyle, MP
    Mitchell, CJ
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 277 - 306
  • [23] Democratic key escrow scheme
    Man, CW
    Safavi-Naini, R
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 249 - 260
  • [24] How to use key escrow
    Ganesan, R
    COMMUNICATIONS OF THE ACM, 1996, 39 (03) : 33 - 33
  • [25] Internet of Things System Based on Mobile Communication Network
    Li, Wanghui
    Bai, Ganghua
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (11) : 64 - 76
  • [26] Reliability consideration of a mobile communication system with network congestion
    Kimura, M
    Yasui, K
    Nakagawa, T
    Ishii, N
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2006, 51 (02) : 377 - 386
  • [27] Performance Analysis of the Global System for Mobile Communication Network
    Liu Pu
    Zhu Bin
    2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 24 - 27
  • [28] Remove key escrow from the Identity-Based Encryption system
    Cheng, ZH
    Comley, R
    Vasiu, L
    EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 37 - 50
  • [29] A key escrow system with protecting user's privacy by blind decoding
    Sakurai, K
    Yamane, Y
    Miyazaki, S
    Inoue, T
    INFORMATION SECURITY, 1998, 1396 : 147 - 157
  • [30] A key escrow scheme with time-limited monitoring for one-way communication
    Abe, M
    Kanda, M
    COMPUTER JOURNAL, 2002, 45 (06): : 661 - 671