期刊文献+

电子商务安全机制中不可抵赖性研究 被引量:3

Research on non-repudiation electronic business
下载PDF
导出
摘要 不可抵赖性是开发电子商务系统必须要解决的问题之一,不可抵赖分为发送方的不可抵赖和接收方的不可抵赖。本文对电子商务的不可抵赖性进行分析和研究,探讨了其解决办法,同时讨论了公开密钥加密体制、单项散列函数、数字签名、FNP、CMP等技术。 Non-repudiation is one of the important questions of development of electronic business system. Nonrepudi-ation consists the sender's non-repudiation and receipt's non-repudiation. Here,the non-repudiation is researched and analyzed and some methods to solve the question are given. At the same time the public key encryption system,digital signature, fair non-repudiation protocol, certified electronic mail protocol etc are discussed.
出处 《河北省科学院学报》 CAS 2007年第4期29-32,共4页 Journal of The Hebei Academy of Sciences
关键词 电子商务 数字签名 不可抵赖 公平不可抵赖协议 可认证的邮件协议 Electronic business Digital signature Non-repudiation Fair non-repudiation protocol Certified electronic mail protocol
  • 相关文献

参考文献4

  • 1Robert H Deng,l.i Gong,Aurel A Lazar,Weiguo Wang. Practical protocols for certified electronic mail [ J]. Journal of Network System Manager, 2006, 4(3):279-297.
  • 2zhou J, Gollmann D. A faimon-repudiation protocol[C]. In- Proceedings of 2006 IEEE Symposium on Security and privacy, 55 - 610aklandCAMay. 2006.
  • 3RSA Laboratories. PKCS# 1 : RSA encryption standard [ Z ]. Versionl, 5, Nov. 2005.
  • 4严蔚敬,吴伟民.数据结构[M].北京:清华大学出版社,1997.

同被引文献21

  • 1魏群,刘玉芳,刘保相.电子商务中CA认证的OPENSSL实现方法[J].微计算机信息,2008,24(6):163-165. 被引量:10
  • 2荣彦,贺惠萍.基于PKI规范的通用认证系统的设计与实现[J].微计算机信息,2006,22(05X):55-57. 被引量:10
  • 3EIGAMAL T. On Computing Logarithms Over Fields[C]. Advances in Cryptology-CRYPTO'85 Proceedings, Springer-Verlag, 1986 : 396-402.
  • 4SCHNORR C P. Efficient signature generation for smart cards[J].Journal of Cryptology,1991,4(3):239-252.
  • 5KAILAR R. Accountability in electronic commerce protocols[J].IEEE Transactions on Software Engineering, 1996, 22(5) : 313-328.
  • 6DENG R H, GONG L, LAZAR A A, et al. Practical protocols for certified electronic mail [J]. Journal of Network System Manager, 2006, 4(3) : 279 -297.
  • 7SYVERSON P F, VAN ORSCHOT P C. On Unifying Some Cryptographic Protocol Logics[C]. Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1994: 14- 28.
  • 8KAILAR R. Accountability in electronic commerce protocols[J].IEEE Transactions on Software Engineering,1996,(05):313-328.
  • 9ROBER T H D,G LI,A AUREL,LAZAR W G WANG. Practical protocols for certified electronic mail[J].Journal of NetworkSystem Manager,2006,(03):279-297.
  • 10SYYERSON P F,P C ORS CHOT. On unifying some cryptographic protocol logics[A].Los Alamitos:IEEE Computer Society Press,1994.14-28.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部