期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Electronic Payment Scheme to Prevent the Treachery
1
作者 FAN Kai ZHANG Jun KOU Weidong XIAO Guozhen 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1745-1748,共4页
Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and i... Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and its security is analyzed. This scheme can prevent the treachery only with the aid of an un-trusted third party. It is very simple and it also improves the security and provides the non-repudiation, accountability, fairness and privacy. 展开更多
关键词 treachery electronic payment scheme electronic commerce security
下载PDF
A New Watermarking Protocol against Conspiracy
2
作者 ZHANG Jun KOU Weidong FAN Kai CAO Xuefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1671-1674,共4页
A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP)... A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided. 展开更多
关键词 watermarking protocol electronic commerce security digital copyright protection conspiracy problem
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部