分享到:

计算机专业时文选读(905)

What Is Ientity Management? $$With the growth of e-business, organizations are wrestling with the chal  (本文共2页) 阅读全文>>

《英语画刊(高级版)》2016年13期
英语画刊(高级版)

改,还是不改

It is one of the disasters of modern life—you finally come up with a memorable(难忘的)and safe password for your computer,but a few months...  (本文共1页) 阅读全文>>

《Science in China(Series F:Information Sciences)》2007年03期
Science in China(Series F:Information Sciences)

Modular approach to the design and analysis of password-based security protocols

In this paper, a general framework for designing and analyzing password-based security protocols is presented. First we introduce the concept of "weak computational indistinguishability" based on current progress of password-based security protocols. Then, we focus on cryptographic foundations for password-based security protocols...  (本文共18页) 阅读全文>>

《电子科技》2000年08期
电子科技

Password Protected LockUp2.0防止他人使用你的电脑

##DPasswordProtectedLockUp是个共享小工具,只有592K。它可以保护你的电脑不让其他人随便使用。Passwor...  (本文共1页) 阅读全文>>

《英语大王》2008年09期
英语大王

The Password

...  (本文共1页) 阅读全文>>

《Science China(Information Sciences)》2017年05期
Science China(Information Sciences)

Universally composable anonymous password authenticated key exchange

Anonymous password authenticated key exchange(APAKE) is an important cryptographic primitive, through which a client holding a password can establish a session key with a server both authentically and anonymously. Although the server is guaranteed that the client in communication is from a pre-determined group, but the client's actual identity is protected. Because of their convenience, APAKE protocols have been wide...  (本文共16页) 阅读全文>>