Key escrow

被引:0
|
作者
Balch, T
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:24 / 24
页数:1
相关论文
共 50 条
  • [31] Key escrow system in mobile communication network
    Tang, Hai-Feng
    Li, Ying-Chun
    Feng, Ling
    Lin, Kang-Hong
    Lu, Qiang
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2003, 24 (08):
  • [32] On Resolving Key Escrow Problem in HIBE and HIBS
    Zheng, Jian-Wu
    Zhao, Jing
    Guan, Xin-Ping
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 215 - 227
  • [33] Research on key escrow technology Based on software
    Yu, Zhengli
    2018 INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SCIENCE AND APPLICATION TECHNOLOGY, 2019, 1168
  • [34] Boolean permutation-based key escrow
    Wu, CK
    Varadharajan, V
    COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (04) : 291 - 304
  • [35] Revocable Key Identity Based Cryptography without Key Escrow Problem
    Gupta, Swati
    Gupta, Vipul
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 443 - 448
  • [36] Publicly verifiable key escrow with limited time span
    Viswanathan, K
    Boyd, C
    Dawson, E
    INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 36 - 50
  • [37] Mitigating key escrow in attribute-based encryption
    Wang, Yongtao
    Liu, Xiaonan
    Liang, Lulu
    Feng, Weiduan
    Yang, Guang
    International Journal of Network Security, 2015, 17 (01) : 94 - 102
  • [38] THE UNITED-STATES KEY ESCROW ENCRYPTION TECHNOLOGY
    DENNING, DE
    COMPUTER COMMUNICATIONS, 1994, 17 (07) : 453 - 457
  • [39] Complement to several algorithm about key escrow system
    Fan, Hongbing
    Dianxun Jishu/Telecommunication Engineering, 37 (05): : 55 - 60
  • [40] New key escrow scheme based on digital certificate
    Xie, Dong-Qing
    Xiong, Zheng-Guang
    Li, Chao
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2001, 28 (06):