期刊文献+

新一代智能物联平台的设计

Design of the New Generation Intelligent Object-Connected Platform
下载PDF
导出
摘要 金融服务与移动通信相结合将智能移动终端、移动通信技术和金融受理网络整合成一个跨领域、跨行业、跨网络的新一代智能物联平台,实现多渠道、全方位的"3A"(Anytime,Anywhere,Anyway)移动金融服务。 Financial services and mobile communications will be integrated intelligent mobile terminals, mobile communications technology and financial management network into a cross-sectoral, cross-industry, cross-network of a new generation of trusted, intelligent object-connected platform to achieve multi-channel, all-round "3A"(Anytime, Anywhere, Anyway) Mobile Financial Services.
作者 刘宇熹 Liu Yuxi(Guangdong University of Financ)
机构地区 广东金融学院
出处 《自动化与信息工程》 2017年第6期44-48,共5页 Automation & Information Engineering
关键词 智能物联平台 移动金融 密钥管理 Intelligent Object-Connected Platform Mobile Finance Key Management
  • 相关文献

参考文献2

二级参考文献10

  • 1Blaze M,Bleumer G,Strauss M. Divertible protocols andatomic proxy cryptography//Proceedings of the Cryptology-Eurocrypt,98. Helsinki, Finland, 1998. LNCS 1403.Springer-Verlag, 1998:127-144.
  • 2Weng J,Deng R H,Ding X,Chu C,Lai J. Conditional proxyre-encryption secure against chosen-ciphertext attack//Proceedings of the 2009 ACM Symposium on Information,Computer and Communications Security ( ASIACCSJ 09 ).Sydney, Australia, 2009:322-332.
  • 3Weng J, Yang Y, Tang Q, Deng R H, Bao F. Efficientconditional proxy re-encryption with chosen-ciphertextsecurity//Proceedings of the 12th International Conferenceon Information Security. Pisa, Italy, 2009. LNCS 5735.Springer, 2009:151-166.
  • 4Asokan N,Schunter M, Waidner M. Optimistic protocolsfor fair exchange//Proceedings of the 4th ACM Conferenceon Computer and Communications Security. Zurich, Switzer-land, 1997:7-17.
  • 5Shamir A. How to share a secret. Communications of theACM, 1979,22(11):612-613.
  • 6Ateniese G, Fu K,Green M,Hobenberger S. Improvedproxy re-encryption schemes with applications to securedistributed storage. ACM Transactions on Information andSystem Security, 2006,9(1):1-30.
  • 7Canetti R,Hohenberger S. Chosen ciphertext secure proxyre-encryption//Proceedings of the 14th ACM Conference onComputer and Communications Security. Alexandria, USA,2007:185-194.
  • 8Libert B,Vergnaud D. Unidirectional chosen-ciphertextsecure proxy re-encryption//Proceedings of the PKCy 08.Barcelona, Spain, 2008. LNCS 4929. Springer-Verlag,2008:360-379.
  • 9Shao J, Cao Z, Liang X,Lin H. Proxy re-encryption withkeyword search. Information Sciences, 2010,180 ( 13 ):2576-2587.
  • 10Boneh D,Franklin M. Identity-based encryption from theWeil airing. SIAM Journal on Computing, 2003,32(3):586-615.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部