期刊文献+

数字证书应用技术浅析

Analysis of the Application Technology of Digital Certificates
下载PDF
导出
摘要 数字证书是网络通信用来识别对方身份的权威凭证,使用数字证书为核心的加密技术可以对网络上传输的信息进行加密和解密、数字签名和签名验证,确保网上传递信息的安全性、完整性。本文初步探讨了数字证书的原理及应用。 Digital certificate is a kind of authorized certificate which network communication uses to discern the identity of the other side. Encryption technology taking digital certificate as its core can encrypt, decode,digital-sign and signature-verify the information transmitted on network to assure the security and integrity of the information. This paper preliminarily discusses the principle and application of digital certificates.
出处 《装备制造与教育》 2017年第3期33-36,共4页 Equipment Manufacturing and Education
关键词 数字证书 加密 应用 digital certificate encryption application
  • 相关文献

参考文献11

二级参考文献51

  • 1余勇,林为民,何军.电力数字证书服务系统的设计及应用[J].电力系统自动化,2005,29(10):64-68. 被引量:23
  • 2刘霞,古天龙,董荣胜,郭云川.移动环境公平支付协议的设计与分析研究[J].通信学报,2007,28(4):32-37. 被引量:2
  • 3(美)Bruce Schneier.应用密码学-协议、算法与C源程序[M].北京:机械工业出版社,2000,1.195-196.
  • 4[1]Ravi S Sandhu, Edward J Coyne, Hal L Feinstein, Charles E Youman. Role-based access control models[J]. IEEE Computer,1996, 29(2): 38-47.
  • 5[2]Zahir Tari, Shun-Wu Chan. A role-based access control for intranet security[J]. IEEE Internet Computing, 1997, 1(5):24-34.
  • 6[3]Jalal Feghhi, Jalil Feghhi, Peter Williams. Digital Certificates: Applied Internet Security[M]. Addison-Wesley, 1999.
  • 7[4]Yung-Kao Hsu, Seymour S P. An intranet security framework based on short-lived certificates[J]. IEEE Internet Computing, 1998, 2(2):73-79.
  • 8[5]Farrell S, Housley R. An internet attribute certificate profile for authorization[R]. Internet Engineering Task Force Draft, work in progress, 1999.
  • 9Li Jiangtao, Li Ninghui, Winsborough W H. Automated Trust Negotiation Using Cryptographie Credentials [C] // Proceeding of the 12^th conference on computer and communications security. Alexandria, Virginia, USA. ACM Press, November 2005: 46-57.
  • 10Yu Ting, Winslett M, Seamons K E. Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation[J]. ACM Transactions on Information and System Security (TISSEC), 2003,6 (1) : 1-42.

共引文献82

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部