-
27瀏覽
-
0點贊
-
0收藏
-
0分享
-
58下載
-
0評論
-
引用
期刊論文
SECURITY ELECTRONIC COMMERCE PROTOCOL BY THE THIRD KIND ENTITES
Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, Dalian, 13-16 August 2006,-0001,():
In e-commerce protocols, malicious participantsmisbehave on their benefits. There is some work in analysisthe application-protocols but little similar work about thefoundation-protocols. To fill the gap we use semi-regularentities to denote the entities different from penetrators thatparticipate in the protocol on behalf of themselves such ascustomers in e-commerce. A method in strand space model isalso presented. After descriptions of hash and Diffie-Hellmanexchange, semi-regular strand and semi-regular node areadded into the model, finally is an attack on the Internet KeyExchange (IKE) protocol as a case.
【免責聲明】以下全部內容由[鄧輝舫]上傳于[2009年06月09日 17時13分45秒],版權歸原創者所有。本文僅代表作者本人觀點,與本網站無關。本網站對文中陳述、觀點判斷保持中立,不對所包含內容的準確性、可靠性或完整性提供任何明示或暗示的保證。請讀者僅作參考,并請自行承擔全部責任。
本學者其他成果
同領域成果