Key escrow system in mobile communication network

被引:0
|
作者
Tang, Hai-Feng
Li, Ying-Chun
Feng, Ling
Lin, Kang-Hong
Lu, Qiang
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Key escrow encryption: the third paradigm
    Denning, Dorothy E.
    Computer Security Journal, 11 (01): : 43 - 52
  • [42] Verifiable partial key escrow scheme
    Beijing Youdian Xueyuan Xuebao, 3 (72-75):
  • [43] Commercial Key Escrow: An Australian perspective
    Caelli, WJ
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 40 - 64
  • [44] Precision planter monitoring system based on mobile communication network
    Li, Bing
    Li, Jiyun
    IET NETWORKS, 2022,
  • [45] Traffic Summary for Analyzing Network Load in Mobile Communication System
    Lee, Y. D.
    Koh, S. G.
    Ahn, B. J.
    KOREAN JOURNAL OF APPLIED STATISTICS, 2006, 19 (03) : 379 - 393
  • [46] Verifiable partial key escrow for PKI
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    Jisuanji Xuebao, 2006, 9 (1584-1589):
  • [47] Hybrid key escrow: A new paradigm
    Viswanathan, K
    Boyd, C
    Dawson, E
    COMPUTERS & SECURITY, 2002, 21 (01) : 77 - 92
  • [48] Nokia stations for users of the network of the mobile communication system ″Actionet″
    Anon
    Elektrosvyaz, 1994, (12): : 42 - 43
  • [49] Verifiable partial key escrow scheme
    Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications, 1998, 21 (03): : 72 - 75
  • [50] A taxonomy for key escrow encryption systems
    Denning, DE
    Branstad, DK
    COMMUNICATIONS OF THE ACM, 1996, 39 (03) : 34 - 39