Zhao et al., 2005 - Google Patents
Application of RSA digital signature technology in circulation of electronic official documentsZhao et al., 2005
- Document ID
- 7632120744587160792
- Author
- Zhao X
- Zhang M
- Publication year
- Publication venue
- Jisuanji Gongcheng yu Sheji(Computer Engineering and Design)
External Links
- 238000005516 engineering process 0 title abstract description 8
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2363822A3 (en) | PC secure video path | |
MX2010000619A (en) | Systems and processes for obtaining and managing electronic signatures for real estate transaction documents. | |
IL189312A (en) | Lock and key system with improved tumblers in the lock | |
EP1708116A3 (en) | Method and system for unlocking a computing device | |
TW200712986A (en) | Secure portable memory mouse device | |
HK1073225A2 (en) | An electronic transaction system with enhanced transaction security and its electronic transaction method. | |
SI2047414T1 (en) | Secure document, in particular electronic passport with enhanced security | |
Zhao et al. | Application of RSA digital signature technology in circulation of electronic official documents | |
WO2009044508A1 (en) | Copyright protection system, reproduction device, and reproduction method | |
HK1151660A1 (en) | The keyboard for encrypting and authenticating against trojan horse with one time key | |
ATE555017T1 (en) | LOCKING DEVICE | |
Wang et al. | Schnorr blind signature based on elliptic curve | |
Wang et al. | Synchronization of Chaotic Systems and Its Applications in Secure Communication | |
Wang | Implementation of secure reinforcementer based on Oracle | |
Lin | A family of computation-efficient parallel prefix algorithms. | |
Alvarez et al. | Improving GSM security for voice and text data transmission. | |
Wang et al. | Cryptanalysis and improvement of new proxy signature scheme. | |
Wang et al. | A best possible computable upper bound on bent functions. | |
Zhang et al. | Design of spam-based worm defense system | |
Chen et al. | Research of strong proxy signature scheme with proxy signer privacy protection. | |
Qin et al. | Threshold digital signature scheme based on ECC and its security. | |
Sucurovic et al. | Java Cryptography And X. 509 Authentication | |
Xue et al. | Conflict-detection of security rules in smaller granularity content protection. | |
Gao et al. | Improved picture total scrambling algorithm based on sort | |
Guo et al. | Research and implementation of XML digital signature |