Key escrow system in mobile communication network

被引:0
|
作者
Tang, Hai-Feng
Li, Ying-Chun
Feng, Ling
Lin, Kang-Hong
Lu, Qiang
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Key Technologies of Cache and Computing in 5G Mobile Communication Network
    Zha, Yanfang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [32] Non-Interactive Authenticated Key Agreement over the Mobile Communication Network
    Wu, Tzong-Sun
    Lin, Han-Yu
    MOBILE NETWORKS & APPLICATIONS, 2013, 18 (05): : 594 - 599
  • [33] Non-Interactive Authenticated Key Agreement over the Mobile Communication Network
    Tzong-Sun Wu
    Han-Yu Lin
    Mobile Networks and Applications, 2013, 18 : 594 - 599
  • [34] Mobile agent based network secure authentication mechanism in mobile communication system
    Deng, Wei
    Chen, Ming-qi
    Ai, Bo
    Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications, 2000, 23 (04): : 93 - 96
  • [35] ASYMETRIC KEY BASED DATA COMMUNICATION UNDER MOBILE CLOUD SYSTEM
    Daisy, S. Mary
    Shaji, R. S.
    Jayan, J. P.
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 547 - 552
  • [36] Research on Key Technologies of 4G Mobile Communication System
    Liu, Ya
    Shi, Xiong
    INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND MECHANICAL AUTOMATION (ICEEMA 2015), 2015, : 561 - 565
  • [37] Robust Mobile Communication System over Opportunistic Communication Connected to Public Network
    Nagamori, Fujie
    Nakae, Toshihiro
    Miyashita, Naoya
    Kimata, Hideaki
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2015, : 249 - 252
  • [38] Mobile communication in the pipeline communication network
    Wu, Weijia
    You Qi Chu Yun/Oil & Gas Storage and Transportation, 1997, 16 (06): : 39 - 41
  • [39] Technology of key escrow in electronic commerce
    Pan, Y.
    Leng, Y.
    Wang, Z.
    Ren, X.
    Fushun Shiyou Xueyuan Xuebao/Journal of Fushun Petroleum Institute, 2001, 21 (02): : 49 - 52
  • [40] Key Escrow from a Safe Distance
    Blaze, Matt
    27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 317 - 321