期刊文献+

Internet的安全通信协议SSL与SET的剖析和比较 被引量:9

下载PDF
导出
摘要 本文就Internet上目前采用的SSL与SET协议的安全性进行分析与比较,并对其在电子商务中的应用做出预测。
作者 孔静萍
出处 《现代计算机》 2000年第89期40-42,共3页 Modern Computer
  • 相关文献

参考文献6

二级参考文献69

  • 1陈颖,杨国才.裸花紫珠抗炎作用及增强免疫功能的实验研究[J].广东微量元素科学,2006,13(8):39-41. 被引量:60
  • 2Yamabe N, Kang KS, Goto E, et al. Beneficial effect of Corni Fructus, a constituent of Hachimi-jio-gan, on advanced glyca- tion end-product-mediated renal injury in Streptozotocin-treated diabetic rats[J]. Biol Pharm Bull, 2007,30 (3): 520-526.
  • 3Yokozawa T, Yamabe N, Kim HY, et al. Protective effects of morronislde isolated from Corni Fructus against renal damage in streptozotoein-induced diabetic ratsl[J]. Biol Pharm Bull, 2008, 31(7) :1422-1428.
  • 4Roh C, Jung U. Screening of crude plant extracts with anti-obe- sity activity[J]. Int J Mol Sci,2012,13(2):1710-1719.
  • 5Yore MM, Syed I, Moraes-Vieira PM, et al. Discovery of a class of endogenous mammalian lipids with anti-diabetic and anti -inflammatory effeets[J]. Ce11,2014,159(2) :318-332.
  • 6Shepherd PR, Kahn BB.Glucose transporters and insulin action implications for insulin resistance and diabetes mel[itus[J]. N Engl J Med,1999,341(4):248-257.
  • 7Ruderman NB, Carling D, Prentki M, et al. AMPK, insulin re- sistance, and the metabolic syndrome[J]. J Clin Invest, 2013, 123(7) :2764-2772.
  • 8Lee JO, Lee SK, Kim JH, et al. Metformin regulates glucose transporter 4 (GLUT4) translocation through AMP-activated protein kinase (AMPN)-mediated Cbl/CAP signaling in 3T3-L1 preadipocyte cells[J]. J Biol Chem,2012,287(53):44121-44129.
  • 9Xu M, Hu J, Zhao W, et al. Quereetin differently regulates in- sulin-mediated glucose transporter 4 translocation under basal and inflammatory conditions in adipocytes[J]. Mol Nutr Food Res,2014,58(5) :931-941.
  • 10Kahn BB, Alquier T, Carling D, et al. AMP-activated protein kinase: ancient energy gauge provides clues to modern under- standing of metabolism[J]. Cell Metab, 2005,1 ( 1 ) : 15-25.

共引文献55

同被引文献24

  • 1钟秀玉.基于Web的MIS信息安全设计[J].微计算机信息,2006,22(06X):111-114. 被引量:3
  • 2方美奇.电子商务概论[M].北京:清华大学出版社,1999..
  • 3刘云.计算机网络实用教程[M].北京:清华大学出版社,2002.322-330.
  • 4Whitman M E,Mattord H J.信息安全原理(第2版).齐立博,译.北京:清华大学出版社,2006
  • 5段剐.加密与解密[M].北京:电子工业出版社.2003:45-47.
  • 6Tulloch M.IIS6管理指南[M].北京:清华大学出版社,2004:278-285.
  • 7张翼飞.基于矩阵型组织的项目管理信息系统的研究与实现[D].沈阳:沈阳航空工业学院计算机学院,2005.
  • 8Duda R O,Hart P E,Stork D G. Pattern Classification 2nd [m].[s.l.] : Wiley,2002.
  • 9Yibing Kong,Jennifer Seberry. A Cryptographic Solution for General Access Control. Janusz R.Getta,Springer-Verlag Berlin Heidelberg 2005.pp :461-473.
  • 10Jajodia, S., Samarati, P, Sapino, M.L., Subrahmanian, V.S : Fie - xible Support for Multiple Access Control Policies. ACM Transactions on Database Systems,Vol. 26,No. 2. ACM Press (2001),pp :214-260.

引证文献9

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部