期刊文献+

一种可信的网上银行认证协议的分析与设计 被引量:4

Analysis and design of trusted online banking authentication protocol
下载PDF
导出
摘要 随着电子支付的普及,安全问题成为了影响其发展的关键问题之一。可信计算平台、PKI认证系统都是保证安全的有效机制。在分析这两种安全机制的基础上,提出了一种结合可信平台和PKI认证系统的网上银行认证协议,通过可信平台模块TPM保证了参与方的计算平台可信性,使用PKI系统和智能卡对银行、持卡人、读卡器进行了身份认证,完成了认证过程,达到安全可信的认证目的。 With the popularization of e-payment, security has become one of the key problems for the development of e-payment. Trusted computing platform and PKI authentication system are both effective mechanisms to ensure security.This paper presents the two mechanisms and proposes an authentication protocol for online banking combining the two mechanisms.For the purpose of security and trust this protocol uses TPM to guarantee the trustworthiness of all parts' computing platforms, uses PKI system and smartcard to authenticate the identities of bank, customer,card reader.
作者 陈楠 朱建明
出处 《计算机工程与应用》 CSCD 北大核心 2011年第12期65-68,共4页 Computer Engineering and Applications
基金 国家自然科学基金No.60673162 No.60970143 教育部科学技术研究重点资助项目(No.109016) 北京市自然科学基金(No.4082028) 中央财经大学"211工程"三期资助项目~~
关键词 可信计算 公钥基础设施(PKI) 认证协议 网上银行 trusted computing Public Key Infrastructure (PKI) authentication protocol online banking
  • 相关文献

参考文献8

  • 1Hiltgen A,Kramp T,Weigold T.Secure Internet banking authentication[J].IEEE Security & Privacy,2006,4(2):21-29.
  • 2Stumpf F,Eckert C,Balfe S.Towards secure e-commerce based on virtualization and attestation techniques[C]//The 3rd International Conference on Availability,Reliability and Security,2008:376-382.
  • 3lliyev D,Choi K H,Kim K J.Dangers of applying Web 2.0 technologies in e-commerce solutions[C]//2008 International Conference on Information Science and Security,2008:376-382.
  • 4谢冬青,冷健.PKI 原理与技术[M].北京:清华大学出版社,2003.
  • 5Felten E W.Understanding trusted computing will its benefits outweigh its drawbacks[J].IEEE Security & Privacy,2003,1(3):60-62.
  • 6谭良,周明天.基于可信计算平台的可信引导过程研究[J].计算机应用研究,2008,25(1):232-234. 被引量:8
  • 7Kailar R,Giigor V.On belief evolution in authentication protocols[C]//IEEE Symposium on Research in Security and Privacy,1991:103-116.
  • 8Burrows M,Abadi M,Needham R.A logic of authentication[J].ACM Transactions on Computer System,1990,8(1):18-36.

二级参考文献15

共引文献7

同被引文献36

  • 1刘建伟,李晖,马建峰.一种适用于HOTP的一次口令生成算法[J].西安电子科技大学学报,2006,33(4):650-654. 被引量:7
  • 2李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:137
  • 3sp3596.网银二代USBKEY安全性大讨论[EB/OL].http://bbs.cisps.org/viewtopie.php?P=126337.
  • 4李伟,于华章.朱鹏飞.一种交互型USBkey方案[C].第十八届全国信息保密学术会议,2008:378-383.
  • 5钱学洪.基于动态口令的网上银行安全认证研究[D].成都:电子科技大学硕士学位论文,2011.
  • 6FAROUGHIAN F F, KALAFATIS S P, LEDDEN L, et al. Value and risk in business-to-business e-bank- ing[J]. Industrial Marketing Management, 2012, 41 (1) : 68-81.
  • 7FIORDELISI F, MARQUESIBANEZ D, MOLY- NEUX P. Efficiency and risk in European banking[J]. Journal of Banking Finance, 2011, 35 (5) : 1815- 1326.
  • 8LEE J R, RAO S, NASS C. et al. When do online shoppers appreciate security enhancement efforts.9 Effects of financial risk and security level on evalua- tions of customer authentication [J]. International Journal of Human-Computer Studies, 2012, 70 (5) : 364-376.
  • 9BONEH D, FRANKLIN M. Identity based encryptior from the weil pairing [C-]//Advances in Cryptology- Crypto" 01, LNCS 2139. Berlin: Springer-Verlag, 2001 : 213-229.
  • 10DING Xuhua,TSUDIK G.Simple identity based cryp- tography with mediated RSA[C]// The Cryptogra- phers Track RSA Conference 2003, LNCS 2612. Ber- lin: Springer-Verlag, 2003: 193-210.

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部