[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zhao et al., 2005 - Google Patents

Application of RSA digital signature technology in circulation of electronic official documents

Zhao et al., 2005

Document ID
7632120744587160792
Author
Zhao X
Zhang M
Publication year
Publication venue
Jisuanji Gongcheng yu Sheji(Computer Engineering and Design)

External Links

Continue reading at scholar.google.com (other versions)

Similar Documents

Publication Publication Date Title
EP2363822A3 (en) PC secure video path
MX2010000619A (en) Systems and processes for obtaining and managing electronic signatures for real estate transaction documents.
IL189312A (en) Lock and key system with improved tumblers in the lock
EP1708116A3 (en) Method and system for unlocking a computing device
TW200712986A (en) Secure portable memory mouse device
HK1073225A2 (en) An electronic transaction system with enhanced transaction security and its electronic transaction method.
SI2047414T1 (en) Secure document, in particular electronic passport with enhanced security
Zhao et al. Application of RSA digital signature technology in circulation of electronic official documents
WO2009044508A1 (en) Copyright protection system, reproduction device, and reproduction method
HK1151660A1 (en) The keyboard for encrypting and authenticating against trojan horse with one time key
ATE555017T1 (en) LOCKING DEVICE
Wang et al. Schnorr blind signature based on elliptic curve
Wang et al. Synchronization of Chaotic Systems and Its Applications in Secure Communication
Wang Implementation of secure reinforcementer based on Oracle
Lin A family of computation-efficient parallel prefix algorithms.
Alvarez et al. Improving GSM security for voice and text data transmission.
Wang et al. Cryptanalysis and improvement of new proxy signature scheme.
Wang et al. A best possible computable upper bound on bent functions.
Zhang et al. Design of spam-based worm defense system
Chen et al. Research of strong proxy signature scheme with proxy signer privacy protection.
Qin et al. Threshold digital signature scheme based on ECC and its security.
Sucurovic et al. Java Cryptography And X. 509 Authentication
Xue et al. Conflict-detection of security rules in smaller granularity content protection.
Gao et al. Improved picture total scrambling algorithm based on sort
Guo et al. Research and implementation of XML digital signature