RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM
| dc.contributor.author | Wenhua, Qi | |
| dc.contributor.author | Qishan, Zhang | |
| dc.contributor.author | Hailong, Liu | |
| dc.date.accessioned | 2016-04-22T17:34:39Z | en |
| dc.date.available | 2016-04-22T17:34:39Z | en |
| dc.date.issued | 2003-10 | en |
| dc.identifier.issn | 0884-5123 | en |
| dc.identifier.issn | 0074-9079 | en |
| dc.identifier.uri | http://hdl.handle.net/10150/606688 | en |
| dc.description | International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada | en_US |
| dc.description.abstract | Security hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect. | |
| dc.description.sponsorship | International Foundation for Telemetering | en |
| dc.language.iso | en_US | en |
| dc.publisher | International Foundation for Telemetering | en |
| dc.relation.url | http://www.telemetry.org/ | en |
| dc.rights | Copyright © International Foundation for Telemetering | en |
| dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | |
| dc.subject | Security hardware | en |
| dc.subject | key pair | en |
| dc.subject | Public Key Infrastructure (PKI) | en |
| dc.subject | token | en |
| dc.title | RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM | en_US |
| dc.type | text | en |
| dc.type | Proceedings | en |
| dc.contributor.department | BeiHang University | en |
| dc.identifier.journal | International Telemetering Conference Proceedings | en |
| dc.description.collectioninformation | Proceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection. | en |
| refterms.dateFOA | 2018-06-26T03:49:31Z | |
| html.description.abstract | Security hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect. |
