网络基于身份密码体制;身份密码学;密码学基于 网络释义 1. 基于身份密码体制 基于身份的密码体制,ide... ... )identity-based cryptography基于身份密码体制) identity based cryptography 基于身份的密码 ... www.dictall.com|基于7个网页 2. 身份密码学 ...
Integrating identity-based cryptography in IMS service authentication. International Journal of Network Security Its Applications, 1-13. (2010)Abid, M., et al, ‘Integrating Identity-Based Cryptography in IMS Service Authentication’, International Journal of Network Security & Its Applications (IJNSA)...
基于身份的密码体制(ID-based cryptography)是SHAM IR在1984年提出的,使用该体制进行加密、签名和认证可以有效地减小系统中用户的存储代价和运算量。 2. By using bilinear pairing of elliptic curve andID-based cryptography, the proposed scheme overcomes some defects from traditional authentication framework based...
2) identity-based cryptography 基于身份的密码体制 1. The model is based onidentity-based cryptography,so as to overcome some problems posed by traditional authentication model based on PKI. 针对目前电子政务中项目管理的新需求,采用基于身份的密码体制和椭圆曲线加密算法,提出了一种安全高效的电子政务网上申...
2) identity-based cryptography 基于身份的密码体制 1. The model is based onidentity-based cryptography,so as to overcome some problems posed by traditional authentication model based on PKI. 针对目前电子政务中项目管理的新需求,采用基于身份的密码体制和椭圆曲线加密算法,提出了一种安全高效的电子政务网上申...
单词 Identity-based cryptography 释义 SeeIBC 随便看 Fairport Harbor Public Library Fairport, Painesville, & Eastern Railway Company Fair Processing Notice Fair Queueing with Service Envelopes Evidential Breath Testing Instrument Evidential Portable Alcohol System Evidential Problem of Evil Evidential Screening ...
Identity-Based Cryptography looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. Since research on the topic is still actively continuing, this is necessarily a snapshot of a field in motion, rather than the final word ...
CryptographySecurityMobileCallsGSMUMTSIdentiy-BasedSmartphonesIn this paper, an identity-based key agreement system and its implementation for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security over...
Consequently, a careful design of GSM security using both symmetric and asymmetric key cryptography would make GSM security more adaptable in security intensive applications. This paper presents a secure and efficient protocol for GSM security using identity based cryptography. The salient features of ...
Multipurpose identity-based signcryption : a Swiss army knife for identity-based cryptography Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys---instead, ...