메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Study of digital signature with encryption based on combined symmetric key

Author keywords

Combined symmetric key; Digital signature; Office automation

Indexed keywords

COMBINED SYMMETRIC KEY; DIGITAL SIGNATURE; DIGITAL SIGNATURE ALGORITHMS; HARDWARE TECHNOLOGY; IS MAINTENANCE; KEY MANAGEMENT; MATRIX; SYMMETRIC KEYS; TIME VARIANT;

EID: 70349660244     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EBISS.2009.5138080     Document Type: Conference Paper
Times cited : (6)

References (6)
  • 1
    • 70349682095 scopus 로고    scopus 로고
    • Bruce Schneider. Applied Cryptography Protocols, algorithms, and source code in C (Second Edition), John Wiley & Sons, Inc. American, 1996
    • Bruce Schneider. Applied Cryptography Protocols, algorithms, and source code in C (Second Edition), John Wiley & Sons, Inc. American, 1996
  • 2
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, vol. 21, pp. 120-126, 1978.
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 3
    • 70349658198 scopus 로고    scopus 로고
    • Nan xianghao, CPK Algorithm and Identification. China Information Security, 2006.9
    • Nan xianghao, CPK Algorithm and Identification. China Information Security, 2006.9
  • 6
    • 70349652963 scopus 로고    scopus 로고
    • The Theory of CPK based on identification
    • The Theory of CPK based on identification, http://ehenxen.com/tz4.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.