-
61浏览
-
0点赞
-
0收藏
-
0分享
-
58下载
-
0评论
-
引用
期刊论文
security electronic commerce protocol by the third kind entites
proceedings of the fifth international conference on machine learning and cybernetics, dalian, 13-16 august 2006,-0001,():
in e-commerce protocols, malicious participantsmisbehave on their benefits. there is some work in analysisthe application-protocols but little similar work about thefoundation-protocols. to fill the gap we use semi-regularentities to denote the entities different from penetrators thatparticipate in the protocol on behalf of themselves such ascustomers in e-commerce. a method in strand space model isalso presented. after descriptions of hash and diffie-hellmanexchange, semi-regular strand and semi-regular node areadded into the model, finally is an attack on the internet keyexchange (ike) protocol as a case.
-
问答
暂无问题,成为第一个提问者
【免责声明】以下全部内容由[邓辉舫]上传于[2009年06月09日 17时13分45秒],全讯担保网的版权归原创者所有。本文仅代表作者本人观点,与本网站无关。本网站对文中陈述、观点判断保持中立,不对所包含内容的准确性、可靠性或完整性提供任何明示或暗示的保证。请读者仅作参考,并请自行承担全部责任。
本学者其他成果
同领域成果