期刊文献+

理性看待网络实名制 被引量:1

Rational View of Network Real-name System
下载PDF
导出
摘要 文章介绍了网络实名制的概念与各国的实践情况,认为网络实名制是互联网发展的大势所趋,应当理性看待网络实名制的的作用和不足,制定科学完善的操作和实施方法,稳步推进网络实名制,促进网络和谐稳定。 This paper introduces the concept of Network Real-name System and the practice of other countries, thinks Network Real-name System is the general trend of Intemet development .Should rational view of the role and shortcomings of Network Real-name System, Formulating scientific and perfect operation and implementation methods, steadily promote Network Real-name System to promote harmonious and stable network.
作者 杨志勇
出处 《信息网络安全》 2012年第8期232-234,共3页 Netinfo Security
关键词 网络实名制 隐私 个人信息 network real-name system privacy personal information
  • 相关文献

参考文献6

二级参考文献50

  • 1黄进,赵小龙,阚宏宇.高校网络实名认证制度的可行性研究[J].科技与经济,2006,19(1):59-60. 被引量:6
  • 2博客中国"网络实名制,虚拟与真实的边界"专题论坛实录[EB/OL].http://www.blogchina.com/201103291112612.html,2011-03-29/2011-07-13.
  • 3Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption). Cost (signature)+ cost (encryption) [C]Advances in Cryptology-CRYPTO' 97, LNCS 1294, Springer-Verlag, 1997. 165-179.
  • 4H. Petersen, M. Michels. Cryptanalysis and improvement of signcryption schemes[J]. IEE Proceedings-Computers and Digital Techniques, 1998, vol. 145, no. 2:149-151.
  • 5F. Bao, R.H. Deng. A signcryption scheme with signature directly verifiable by public key[C]In Proc. Public Key Cryptography-PKC' 98, LNCS 1431, Springer-Verlag, 1998.55-59.
  • 6D.H. Yum, P.J. Lee. New signcryption schemes based on KCDSA[C]lnformation Security and Cryptology-ICISC2001, LNCS 2288, Springer Verlag, 2002. 305-317.
  • 7J.B. Shin, K. Lee, and K. Shim. New DSA-verifiable signcryption schemes[C].Information Security and Cryptology-ICISC 2002, LNCS 2587, Springer-Verlag, 2003.35-47.
  • 8H.Y. Jung, D.H. Lee, J.l. Lim, and K.S. Chang, Signcryption schemes with forward secrecy[C]. Information Security Application-WISA 2001, Seoul, Korea, 2001. 463-475.
  • 9R. Steinfeld, Y. Zheng. A signcryption scheme based on integer factorization[C]lnformation Security Workshop-ISW 2000, LNCS 1975, Springer-Verlag, 2000. 308-322.
  • 10J. Malone-Lee and W. Mao, Two birds one stone: signcryption using RSA[CITopics in Cryptology-CT-P, SA 2003, LNCS 2612, Springer Verlag, 2003.211-226.

共引文献37

同被引文献1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部