Please use this identifier to cite or link to this item:
http://hdl.handle.net/11455/43663
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Li, C.T. | en_US |
dc.contributor.author | 黃明祥 | zh_TW |
dc.contributor.author | Hwang, M.S. | en_US |
dc.contributor.author | Chen, S.M. | en_US |
dc.date | 2010 | zh_TW |
dc.date.accessioned | 2014-06-06T08:11:18Z | - |
dc.date.available | 2014-06-06T08:11:18Z | - |
dc.identifier.issn | 1349-4198 | zh_TW |
dc.identifier.uri | http://hdl.handle.net/11455/43663 | - |
dc.description.abstract | The concept of batch verifying multiple RSA digital signatures is to find a method that multiple digital signatures can be verified simultaneously in only one exponential operation time. In this article, we pm posed a new batch verifying multiple RSA digital signatures scheme. The main contribution of the proposed scheme is that it can easily discover where the signature-verification fault is located without re-verifying all individual signatures separately. | en_US |
dc.language.iso | en_US | zh_TW |
dc.relation | International Journal of Innovative Computing Information and Control | en_US |
dc.relation.ispartofseries | International Journal of Innovative Computing Information and Control, Volume 6, Issue 12, Page(s) 5311-5320. | en_US |
dc.subject | Digital signature | en_US |
dc.subject | Information security | en_US |
dc.subject | Multiple signatures | en_US |
dc.subject | PKI | en_US |
dc.subject | RSA | en_US |
dc.subject | ad hoc networks | en_US |
dc.subject | digital-signatures | en_US |
dc.subject | key establishment | en_US |
dc.subject | scheme | en_US |
dc.subject | efficient | en_US |
dc.subject | secure | en_US |
dc.subject | protocol | en_US |
dc.subject | authentication | en_US |
dc.title | A BATCH VERIFYING AND DETECTING THE ILLEGAL SIGNATURES | en_US |
dc.type | Journal Article | zh_TW |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.languageiso639-1 | en_US | - |
item.fulltext | no fulltext | - |
item.grantfulltext | none | - |
item.openairetype | Journal Article | - |
Appears in Collections: | 資訊管理學系 |
TAIR Related Article
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.