Key escrow system for network environment based on RSA algorithm

被引:0
|
作者
Yang, Bo
Wang, Yumin
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:194 / 197
相关论文
共 50 条
  • [2] A key escrow system of the RSA cryptosystem
    Sameshima, Y
    [J]. INFORMATION SECURITY, 1998, 1396 : 135 - 146
  • [3] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    ZHU Yan
    WANG Shanbiao
    MA Di
    FENG Rongquan
    [J]. Chinese Journal of Electronics, 2014, 23 (04) : 842 - 850
  • [4] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    Zhu Yan
    Wang Shanbiao
    Ma Di
    Feng Rongquan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 842 - 850
  • [5] Key escrow system in mobile communication network
    Tang, Hai-Feng
    Li, Ying-Chun
    Feng, Ling
    Lin, Kang-Hong
    Lu, Qiang
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2003, 24 (08):
  • [6] Complement to several algorithm about key escrow system
    Fan, Hongbing
    [J]. Dianxun Jishu/Telecommunication Engineering, 37 (05): : 55 - 60
  • [7] A public-key-based key escrow system
    Nechvatal, J
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 1996, 35 (01) : 73 - 83
  • [8] On the key recovery of the Key Escrow System
    Lee, YC
    Laih, CS
    [J]. 13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 216 - 220
  • [9] On the key escrow system without key exchange
    Lee, Yung-Cheng
    Laih, Chi-Sung
    [J]. Computers and Electrical Engineering, 1999, 25 (04): : 279 - 290
  • [10] On the key escrow system without key exchange
    Lee, YC
    Laih, CS
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (04) : 279 - 290