您要查找的是不是:
- Key Escrow System in Mobile Communication Network 移动通信中的密钥托管方案
- A threshold key escrow system with time bounds and an analysis of its security 时间约束下的门限密钥托管体制及其安全性分析
- On the Software Key Escrow System 软件密钥托管加密系统研究
- Key Escrow System 主要契约系统
- This might involve key escrow, back doors into a system, or other methods. 这可能涉及密钥契约、在系统中开后门或其它方法。
- Threshold scheme of key escrow based on elliptic curve system, which can avoid cheat, is proposed, and its security is analyzed. 提出了基于椭圆曲线体制的门限密钥托管方案;并对其安全性进行了分析、论.
- So this whole key escrow debate is a big issue that has a political element to it. 如此全部关键性的附带条件委付盖印契约辩论是一个有对它的一种政治上的元素大争议。
- You can also choose cooperation with the escrow system, it is not only a content publishing engine, but also on behalf of you to cooperate with the CDN. 你也可以选择与第三方托管系统合作,它不仅是个内容发布引擎,还能代表你与CDN进行合作。
- This program is available on a processor chip called the clipper chip and is also known as the key escrow chip. 这种程序可在一种处理器芯片上得到,该芯片称为加密芯片,通常也称为密钥托管芯片。
- In this scheme, the trust transfer and key escrow are achieved in by the addition of a trusted third party (TA). 本文通过加入辅助认证方(TA)的方式实现信任转移,解决密钥托管的问题。
- However, there are some problems in IBE such as identity authentication, private key distribution, key escrow and so on. 同时,基于身份加密的公钥密码系统中也存在着一些问题,如身份认证、私钥分发以及密钥托管等。
- The key escrow from a new perspective through some improvements to IBE is solved. An improvement scheme in view of monitor is designed. 概述了IBE的密钥托管问题并给出了现有的解决方法,在此基础上给出了一个改进的方案,同时实现了对监听的要求。
- A key escrow cryptosystem can provide protection for user s privacy, while at the same time, allows for the wiretapping when lawfully authorized. 密钥托管密码体制不仅能保护用户的隐私权,同时允许法律授权下的监听。
- A key escrow cryptosystem can not only provide protection for user s privacy, while at the same time, allows for the wiretapping when lawfully authorized. 密钥托管密码体制不仅能保护用户的隐私权,同时允许法律授权下的监听。
- This paper introduces the main components of key escrow encryption systems and their functions, and includes the general model for key escrow encryption systems by relation between components, finally analyses security of key escrow encryption systems. 本文在介绍密钥托管加密系统各部分组成及其功能的基础上,讨论了各部分之间的关系,并总结出密钥托管加密系统的一般模型,然后据此对密钥托管加密系统环境的安全性进行了分析。
- In PKI System, CA provide certificates to management the public key, while the private key is protected by other sides such as the KEA(Key Escrow Agent) or managed by self. In fact, The smart card is widely used. 在现有的PKI体系中,由PKI下的证书机构(Certificate Authority,CA)提供证书来维护公钥,采用智能卡作为私钥管理解决方案。
- New scheme not only solved the problem of key escrow by the idea of CL-PKE but also provided fast key revocation with mediator.New scheme can resist the attack of replacing user s public key. 新方案利用椭圆曲线上的双线性映射构造,通过无证书加密思想解决密钥托管的问题,通过引入仲裁机构解决密钥撤销的问题,新方案能够抵抗替换用户公钥的攻击。
- At the same time,the key generator center creates partial private keys for nodes,and then solves the key escrow problem in the identity-based cryptography. 同时密钥生成中心为用户生成部分私钥,解决了基于身份密码体制中的密钥托管问题;
- No Cheat Scheme of Threshold Key Escrow Based on Elliptic Curve System 基于椭圆曲线体制的防止欺诈门限托管方案
- Verifiable Dynamic Key Escrow Scheme 一种可验证的动态密钥托管方案