期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Fair Micropayment System Based on Hash Chains 被引量:1
1
作者 杨宗凯 郎为民 谭运猛 《Tsinghua Science and Technology》 SCIE EI CAS 2005年第3期328-333,共6页
Micropayment schemes usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misusing the protocols. This paper proposes a... Micropayment schemes usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misusing the protocols. This paper proposes an efficient hash chain-based micropayment scheme, which is an offline, prepaid scheme that supports simpler divisibility of digital coins. In the execution of payment protocol, the customer’s dis- bursement and the merchant’s submittal are performed step by step, whoever cannot gain addition profits even if he breaks off the transaction. The hash chain can also be used for transactions with different mer- chants. Unlike other micropayment schemes, e.g., PayWord, no public-key operation is required,which im- proves the efficiency. The scheme also provides restricted anonymity. 展开更多
关键词 micropayment hash chain PAYWORD DIVISIBILITY
原文传递
Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems
2
作者 刘雪宁 尹浩 +1 位作者 林闯 杜长来 《Tsinghua Science and Technology》 SCIE EI CAS 2009年第2期234-241,共8页
Recent development of the peer-to-peer (P2P) live streaming technique has brought unprecedented new momentum to the Internet with the characters of effective, scalable, and low cost. However, before these applicatio... Recent development of the peer-to-peer (P2P) live streaming technique has brought unprecedented new momentum to the Internet with the characters of effective, scalable, and low cost. However, before these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust- Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate, (2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the session key and delivered to the communication group, and (4) the session key is periodically updated and distributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, reliable, and efficient access control solution for P2P live streaming systems. 展开更多
关键词 peer-to-peer (P2P) live streaming user authentication key management hash chain media-dependent
原文传递
Anonymous authentication protocol for multi-services in wireless environments
3
作者 JIANG Nan WANG Jian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第4期69-74,共6页
关键词 AUTHENTICATION wireless networks trusted domain secret splitting hash chain
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部