<track id="j575v"><span id="j575v"><th id="j575v"></th></span></track>
<address id="j575v"></address>

    <video id="j575v"><progress id="j575v"><progress id="j575v"></progress></progress></video>

      <p id="j575v"></p>

    
    
      <form id="j575v"><dl id="j575v"></dl></form>
      <video id="j575v"></video><nobr id="j575v"></nobr><video id="j575v"></video>
        <track id="j575v"></track>

        <pre id="j575v"></pre><big id="j575v"><span id="j575v"></span></big>

            您當前所在位置: 首頁 > 學者

            鄧輝舫

            • 27瀏覽

            • 0點贊

            • 0收藏

            • 0分享

            • 58下載

            • 0評論

            • 引用

            期刊論文

            SECURITY ELECTRONIC COMMERCE PROTOCOL BY THE THIRD KIND ENTITES

            鄧輝舫 , JIE YANG , HUI-FANG DENG

            Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, Dalian, 13-16 August 2006,-0001,():

            URL:

            摘要/描述

            In e-commerce protocols, malicious participantsmisbehave on their benefits. There is some work in analysisthe application-protocols but little similar work about thefoundation-protocols. To fill the gap we use semi-regularentities to denote the entities different from penetrators thatparticipate in the protocol on behalf of themselves such ascustomers in e-commerce. A method in strand space model isalso presented. After descriptions of hash and Diffie-Hellmanexchange, semi-regular strand and semi-regular node areadded into the model, finally is an attack on the Internet KeyExchange (IKE) protocol as a case.

            關鍵詞: Semi-regular entity , Strand space , TLS , IKE

            【免責聲明】以下全部內容由[鄧輝舫]上傳于[2009年06月09日 17時13分45秒],版權歸原創者所有。本文僅代表作者本人觀點,與本網站無關。本網站對文中陳述、觀點判斷保持中立,不對所包含內容的準確性、可靠性或完整性提供任何明示或暗示的保證。請讀者僅作參考,并請自行承擔全部責任。

            我要評論

            全部評論 0

            本學者其他成果

              同領域成果

                久久久久久精品免费免费_香港经典a毛片免费观看变态_天堂av无码大芭蕉伊人av_俄罗斯强奷女人在线播放