期刊文献+

数字签名在网络教育中的应用探讨

A Study of the Network Education for Safety
下载PDF
导出
摘要 从我国网络教育的发展现状着手,分析网络教育目前存在的信息被窃取、窃听、篡改及无法确认网络中教育信息的发送者及接收者的身份等问题,针对这些问题,提出通过数字签名方式初步解决网络教育的安全问题。 From our country the development of the network education present situation,analysis of the existing problems,Such as: information from being stolen,eavesdropping,tampering and was unable to confirm the network education information to the sender and recipient identity issues,To solve these problems,Put forward by the digital signature encryption mode preliminary solve security problems of network education.
出处 《廊坊师范学院学报(自然科学版)》 2012年第1期29-30,33,共3页 Journal of Langfang Normal University(Natural Science Edition)
关键词 网络教育 数字签名 代理签名 network education digital signature proxy signature
  • 相关文献

参考文献2

  • 1Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystem[J]. Comm. of the ACM, 1978,2(2) : 120 - 146.
  • 2蔡勉,康莉.一种安全的多级代理签名方案[J].中国科学院研究生院学报,2006,23(5):653-659. 被引量:9

二级参考文献11

  • 1Mambo M, Usuda K, Okamato E. Proxy signature:Delegation of the power to sign messages. IEICE Trans. Fundamentals, 1996, E79-A(9) : 1338-1353.
  • 2Kotzanikolaous P,Burmcster M, Chrisskopoulos V. Secure transactions with mobile agents in hostile environments. In: Proc. ACISP 2000, LNCS,2000,1841:289 - 297.
  • 3Sander T,Tschudin C. Towards Mobile Cryptography. Technical report, International Computer Science Institute, Berkeley , 1997.
  • 4Lee B, Kim H, Kim K . Secure mobile agent using strong non-designated proxy signature. In : Proc. of ACISP 2001, Springer-Verlag, LNCS,2001,2119:474 - 486.
  • 5Shao ZH. Proxy signature schemes based on factoring. Information Processing Letter, 2003,85:137 - 143.
  • 6伊丽江.代理签名及应用研究:[博士学位论文].西安:西安电子科技大学,2000.
  • 7KIM S, PARK S, WON D. Proxy signatures. In : Proc of ICICS'97, International Conference on Information and Communications Security, Berlin :Springer- verlag, LNCS, 1997,1334 : 223 - 232.
  • 8Sun HM, Hsieh BT. Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection . IEEE, 0-7803-7882-2/03, 2003:474 -476.
  • 9Mambo M, Okamoto E. Proxy eryptosystems : delegation of the power to decrypt eiphertexts. IEICE Trans.fundamentals.1997,E80-A(1):54-63.
  • 10谭作文,刘卓军.一个前向安全的强代理签名方案[J].信息与电子工程,2003,1(4):257-259. 被引量:18

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部