基于PIC单片机的防伪包装技术
Anti-Forgery Packaging Technology Based on PIC Single Chip
摘要
文中提出将PIC单片机技术和密码学原理应用到防伪包装领域;介绍一种可控密码防伪包装技术的结构特点、作用原理及实际防伪效果。
This paper put forward the PIC single chip technology and cryptography theory which were applied in anti-forgery packaging. It also introduced the working principles and construction features as well as practical effects of the controllable crypto anti-forgery packaging technology.
出处
《包装工程》
CAS
CSCD
北大核心
2003年第5期34-35,共2页
Packaging Engineering
二级参考文献13
-
1纪宣成.市场营销学教程[M].北京:中国人民出版社,1998..
-
2姜锐.包装设计[M].长沙:湖南大学出版社,1985..
-
3U.M. Maurer. Conditionally - perfect secrecy and a provably - secure randomized cipher. Joural of Crytyology, 5(1):53-66,1992.
-
4C. Cachin, C. Crepeau, and J. Marcil. Oblivivous transfer with a menory - bounded receiver. In proc. 37th IEEE Symposium on Foundations of Computer Science. 1998.
-
5D. Dolev .C. Dwork,and M. Naor. Non - malleable Cryptography. SIAMJ. comp, 30(2): 391-437, 2000.
-
6M. Bellare and A. Sahai. Non - Malleable Encryption :Equivalence between Two Notions,and an Indistinguishability-Based Characterization,In Advances in Cryptology - Crypto'99.1999.
-
7A. Sahai. Non - Malleable Non - Interactive Zero Knowledge and Adaptive chosen - ciphertext security. In Proc. 40th IEEE symposium on Foundations of computer science. 1999.
-
8J. Kata and M. Yung. Complete characterization of security notations for probabilistic privats - key encryption. In Proc.32nd ACM symposium on Theory of computing, 2000.
-
9Y. Auman and M. O. Rabin. Information Theoretically Secure Communucation in the Limited storage Space Model. In Advances in Cryptology - Crypto'99, pages 65-79,1999.
-
10Y. Auman, Y. Z. Ding and M. O. Rabin. Everlasting Security in the Bounded storage Model. IEEE Transactions on Informtion Theory, 2001.
-
1向华.MIS系统中的身份证号码校验[J].长江大学学报(自科版)(上旬),2008,5(1):61-63.
-
2RFID医用防伪包装技术符合FDA要求[J].丝网印刷,2006(11):54-54.
-
3龚友平,谢志坚.磁盘文件的加密[J].长沙水电师院学报(自然科学版),1995,10(1):27-31.
-
4范林秀,陈舒娅,王喜进.基于PKI的身份认证在电子商务中的研究[J].电脑知识与技术(过刊),2007(22):979-980. 被引量:7
-
5屠文.企业电子交易平台身份认证系统的关键技术研究[J].中国高新技术企业,2008(14):149-149.
-
6刘镪,王胜男.基于身份标识的密码体制及其在安全电子邮件的应用[J].信息安全与技术,2014,5(6):70-72. 被引量:2
-
7尹立君.加密传输在基于C/S模式的考试系统中的应用[J].太原城市职业技术学院学报,2014(12):191-192.
-
8金国斌.防伪包装技术的选择与应用[J].中国包装,1997,17(6):49-51. 被引量:1
-
9张建清,郑全成.模内贴标防伪包装技术应用[J].中国包装,2006,26(6):67-68.
-
10田伟莉.密码学与网络安全的实现[J].潍坊学院学报,2005,5(4):40-41. 被引量:2