期刊文献+

证券电子商务的安全特性 被引量:4

Security characteristic of E-business of securities
下载PDF
导出
作者 陈舜
出处 《中国金融电脑》 2003年第12期61-63,共3页 Financial Computer of China
  • 相关文献

参考文献3

二级参考文献18

  • 1[3]David D.Test show PKI promise:bridge architecture links certificates from multiple vendors,Internet Week,2000:45~51
  • 2天威诚信电子商务.网上证券交易安全需求分析[J].中国证券信息技术,2002,(12):29-31.
  • 3Winbom H,Jones R P. Member Access via VPN,OM White Pa per,March,2003
  • 4邹彬琦.利用SSL技术实现证券公司网上交易[J].中国证券信息技术,2002,(12):32-34.
  • 5Ellison C,Schneier B. Ten risks of PKI: What you are not being told about Public Key Infrastructure. Computer Security Journal, 2000, ⅩⅦ(1)
  • 6Boneh D, Lynn B, Shacham H. Aggregate and verifiably encrypt ed signatures from bilinear maps. In:E. Biham,ed. Proc. of Eurocrypt 2003, volume 2656 of LNCS, Springer-Verlag, 2003. 416 ~ 432
  • 7Boldyreva A. Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature. In: Y. Desmedt, ed. Proc. of PKC 2003, volume 2567 of LNCS, Springer-Verlag, 2003. 31~46
  • 8Boneh D, Gentry C, Lynn B,Shacham H. A survey of Two Signa ture Aggregation Techinques. RSA Laboratories, 2003,6 ( 2 )
  • 9Joux A, Nguyen K. Separating decision Diffie-Hellman from Diffie-Hellman in Cryptographic groups. Cryptology ePring Archive:[Report 2001/003]. 2001. http:∥eprint. iacr. org/.
  • 10Jakobsson M, Mraihi D, Tsiounis Y, Yung M. Electronic Payments:Where Do We Go From Here.? In: R. Baumgart, ed. LNCS 1740. Springer-Verlag, 1999. 43~63

共引文献3

同被引文献19

  • 1魏建行,尚开雨,胡轶.电子商务安全体系及关键技术浅析[J].网络安全技术与应用,2006(6):86-87. 被引量:2
  • 2刘晓辉,杨卫东.搭建网络应用基础平台[M].北京:科学出版社,2005.
  • 3[3]David D.Test show PKI promise:bridge architecture links certificates from multiple vendors,Internet Week,2000:45~51
  • 4天威诚信电子商务.网上证券交易安全需求分析[J].中国证券信息技术,2002,(12):29-31.
  • 5Winbom H,Jones R P. Member Access via VPN,OM White Pa per,March,2003
  • 6邹彬琦.利用SSL技术实现证券公司网上交易[J].中国证券信息技术,2002,(12):32-34.
  • 7Ellison C,Schneier B. Ten risks of PKI: What you are not being told about Public Key Infrastructure. Computer Security Journal, 2000, ⅩⅦ(1)
  • 8Boneh D, Lynn B, Shacham H. Aggregate and verifiably encrypt ed signatures from bilinear maps. In:E. Biham,ed. Proc. of Eurocrypt 2003, volume 2656 of LNCS, Springer-Verlag, 2003. 416 ~ 432
  • 9Boldyreva A. Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature. In: Y. Desmedt, ed. Proc. of PKC 2003, volume 2567 of LNCS, Springer-Verlag, 2003. 31~46
  • 10Boneh D, Gentry C, Lynn B,Shacham H. A survey of Two Signa ture Aggregation Techinques. RSA Laboratories, 2003,6 ( 2 )

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部