透過您的圖書館登入
IP:18.189.2.122

並列摘要


The signature can be copied or falsified, especially being sent via the Net. The method being proposed is an algorithm or cryptosystem to guarantee the transmitted information is completed and correct as well as clearly sure of who was the signer. The philosophy is if a sender has a unique codebook and the cipher text can never be written by another person and once the correct receiver uses his unique codebook to solve the cipher text for the plaintext, it is sure that the sender is the correct sender and the receiver is the correct receiver.

被引用紀錄


Hsu, Y. N. (2013). 應用於生醫系統之低功耗類比數位轉換器暨多功能神經刺激器 [master's thesis, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2013.10637
Chang, H. W. (2012). 應用於心電訊號偵測系統之類比數位轉換器 [master's thesis, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2012.10021
Chang, C. M. (2007). HOY 無線測試平台基頻收發機之設計與實現 [master's thesis, National Tsing Hua University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0016-1411200715161352
李志潘(2008)。基於浮動密碼典加密法之應用模擬〔碩士論文,亞洲大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0118-0807200916285473
Ya, H. S. (2008). 異質基對稱加密之研究 [master's thesis, Asia University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0118-0807200916285471

延伸閱讀