期刊文献+

校园信息化建设中E卡通系统的安全配置

The Security Configuration of E System of Campus Informatization Construction of Cartoon
下载PDF
导出
摘要 苏州全市中小学已经普遍使用教育E卡通,它不仅满足于校园信息化的建设,而且充当了公交卡、借书卡、园林卡等其他第三方功能的应用,随之接口应用应运而生。它让两者不能通用的系统,有机地结合到一起,达到共赢的目的。 Suzhou city schools have been widely used in education E KA-TONG, it not only meet in the construction of campus information, but also as the application of public transportation card, library card, Garden card and other third party function. Interface emerge as the times require. It makes the two can not be universal system, organic combination together, achieve the win-win purpose.
作者 周臣
机构地区 苏州电教馆
出处 《信息安全与技术》 2013年第5期109-111,共3页
关键词 数字教育 第三方接口 digital education third party interface access control system
  • 相关文献

参考文献2

二级参考文献18

  • 1Bellovin SM, Merrit M. Encrypted key exchange: password-based protocols secure against dictionary attacks[C]. Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1992.72-84.
  • 2Bellare M. Rogaway P. Entity authentication and key distribution[C]. Advances in Cryptology- Crypto'93, 1993. 232-249.
  • 3Bellar M. Pointcheval D.Rogaway P. Authenticated key exchange secure against dictionary attacks[C]. Advances in Cryptolog3'-Eurocrypt'00, 2000 139-155.
  • 4M. Hilbl , T. Welzer, B. Brumen. Two proposed identity-bed three- party authenticated key agreement protocols from pairings[J]. Computers & Security, 2010, 29: 244-252.
  • 5Lee, T.F., Hwang, T. Lin, C.L. Enhanced three-party encrypted key exchange without server public keys[J]. Computers & SecuriW, 2004, 23(07): 571-577.
  • 6Lee, S.W. Kim, H.S., Yoo, K.Y. Efficient verifier-based key agreement protocol R)r three parties without sewer's public key[J]. Applied Mathematicsand Computation, 2005, 167(2): 996-1003.
  • 7Lin, C.L. Sun, H.M. Hwang, T. Three-party encrypted key exchange: attacks aaad a solution[J]. ACM Operating Systetrt Review, 2010, (34): 12-20.
  • 8Sun, H.M. Chen, B.C. Hwang, T. Secure key agreement protocols for three-party agaimt guessing attacks[J]. Journal of Systems and Softavare, 2)5, 75: 63-68.
  • 9Chen, T.H. Lee, W.B. Chen, H.B. A round-mad computation-eflficient three-party authenticated key exchange protocol[J]. Journal of Systems and Software, 2)8, 81 : 1581 - 1590.
  • 10Schnorr, C.P. Efficient identification and signature for smart cards[C]. Proceedhlgs of CRYPTO' 89, 1989. 9,239-252.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部