This chapter provides design patterns for data confidentiality and dataoriginauthentication.
本章为数据保密性和数据来源的鉴定提供了设计模式。
2
In this paper, several typical dataoriginauthentication protocols with non-repudiation are summarized according to the taxonomy of dataoriginauthentication with non-repudiation.