Map
Index
Random
Help
th

Quote: mutual authentication using public-key cryptology; with a smart card, the users' secrets are not exposed to the certification center

topics > all references > references i-l > QuoteRef: leePJ1_1990 , p. abstract



Topic:
public key encryption
Topic:
security by seal
Topic:
embedded systems

Quotation Skeleton

Secure authentication of users' identity to deny illegitimate … network assets. … In this study a sequence and convenient user … public-key cryptographic techniques. This two-round protocol assumes that … a user access terminal. This protocol provides a … at no extra cost. By the use of … process, we considered two initialization protocols, with dumb … need not be exposed even to the trusted …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: public key encryption (30 items)
Topic: security by seal (16 items)
Topic: embedded systems (26 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.