This chapter provides design patterns for data confidentiality and data origin authentication.
本章为数据保密性和数据来源的鉴定提供了设计模式。
In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation.
该文按照协议分类分别概述了几个具有代表性的不可否认数据源认证协议,并对每一个协议的优缺点和存在问题进行了讨论。
In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation.
该文按照协议分类分别概述了几个具有代表性的不可否认数据源认证协议,并对每一个协议的优缺点和存在问题进行了讨论。
应用推荐