期刊文献+

基于数字签名的安全电子商务交易系统的实现方法 被引量:1

Method of Realizing Secure Electronic Transaction system in Network Based on Digital Signature
下载PDF
导出
摘要 为了在一个不安全的计算机网络系统上实现安全的电子商务交易,本文给出了具有手写签字效果的网上安全电子商务交易系统的实现方法和方案,可保证网络上电子商务交易的保密性、完整性、不可抵赖性、鉴别即身份认证,并且能够防御重放攻击。实验结果表明该方法相当强大、安全、可靠且可用性强。 For realizing secure electronic transaction in non-secure computer network,the method of realizing secure electronic transaction system with the effect of signatures written by hand is developed in the paper. The confidentiality integrity、authenticity non-repudiation、authenticity of message can be ensured in the method against replay attacks. Experiment results shown that this method was very secure、confidential、useful and applicable.
出处 《华北科技学院学报》 2010年第2期89-93,共5页 Journal of North China Institute of Science and Technology
关键词 数字签名 安全电子商务交易 身份认证 重放攻击 Digital signature Secure electronic transaction Authentication Replay attacks
  • 相关文献

参考文献5

  • 1YU Sheng-chen.Method for Getting Inter-Independent Features Used to Intrusion Detection System In Controllable and Trusted Networks[C].GCIS 2009:461-465.
  • 2FAN Yu-tao,YU Sheng-chen.Solution to Character Compression of Intrusion Detection System In Controllable and Trustednet Works[C].ITESS,2008:704-710.
  • 3余生晨,王树,高晓燕,黄江兰.网络入侵检测系统中的最佳特征组合选择方法[J].计算机工程,2008,34(1):150-152. 被引量:19
  • 4YU Sheng-chen,sha Jia-xiang.Automatically Reconciling Robustness and Imperceptibility of Embedded Watermarking In wavelet Transform Domain using Genetic algorithm[C].ITESS' 2008:450-452.
  • 5Desmedt Y,Frankel Y.Shared Generation of Authenticators and Signatures[C].Advances in Cryptology-Crypto' 91 Proceedings.Berlin:Springer-Verlag,1992,576:457-469.

二级参考文献6

  • 1陈国良,王熙法,庄镇泉,等.遗传算法及其应用[M].北京:人民邮电出版社,2003.
  • 2Mukherjee B,Levitt N.Network Intrusion Detection.IEEE Networks[J].2005,24(3):26-29.
  • 3Intrusion Detection Attacks Database[DB/OL].[2006-12-15].http://www.ll.mit.edu.
  • 4Zhang Y G.Intrusion Detection Techniques for Mobile Wireless Networks[J].Wireless Networks,2003,(9):545-550.
  • 5Zamboni D.Using Internal Sensors for Computer Intrusion Detection[D].[S.l.]:Faculty of Purdue University,2001-08.
  • 6Future-generation Internet Architecture[DB/OL].[2006-12-15].http://www.isi.edu.

共引文献18

同被引文献11

  • 1HUTTER M, TOEGL R. A trusted platform module for near field communication [ C ]//2010 Fifth Interna- tional Conference on Systems and Networks Communi- cations. NewYork : IEEE Press ,2011 : 136 - 141.
  • 2NFC. Forum. Nfcforum - ts - smartposter_rtd_ 1. 0 [ S]. 2006.
  • 3ROLAND M, LANGER J. Digital signature records for the nfc data exchange format[ C ]. Near Field Commu- nication (NFC) 2010 Second International Workshop, NewYork:IEE Press, 2010,10 : 71 -76.
  • 4陈卓,阮鸥,沈剑.网络安全编程与实践[M].1版.北京:国防工业出版社,2008:8-36.
  • 5NFC Forum. Nfcforum - ts - ndef_rtd_1. 0[ S]. 2006.
  • 6NFC. Forum. Nfcforum - ts - signature rtd 1. 0 [ S ]. 2006.
  • 7CHENG Hsu-chen, LIAO Wen-wei, CHI Tian-yow, et al. A secure and practical key management mechanism for NFC read - write mode [ C ]//Advanced Communi- cation Technology (ICACT) , 2011 13th International Conference, NewYork: IEEE Press, 2011: 1095 - 1100.
  • 8MARKUS K. Digital signatures on nfc tags[ D]. Stock- holm, Sweden: Reyal Instinte of Technology (KTA) , 2009.
  • 9刘志武,李代平,湛德照,王挺,游剑锋,周允强,梅小虎,郭鸿志.绑定式近场通信3GCOS安全性研究[J].计算机工程,2009,35(23):164-165. 被引量:3
  • 10刘姗姗.近距离通信安全研究[J].中国新通信,2010,12(9):30-31. 被引量:4

引证文献1

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部