-
61浏览
-
0点赞
-
0收藏
-
0分享
-
58下载
-
0评论
-
引用
期刊论文
SECURITY ELECTRONIC COMMERCE PROTOCOL BY THE THIRD KIND ENTITES
Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, Dalian, 13-16 August 2006,-0001,():
In e-commerce protocols, malicious participantsmisbehave on their benefits. There is some work in analysisthe application-protocols but little similar work about thefoundation-protocols. To fill the gap we use semi-regularentities to denote the entities different from penetrators thatparticipate in the protocol on behalf of themselves such ascustomers in e-commerce. A method in strand space model isalso presented. After descriptions of hash and Diffie-Hellmanexchange, semi-regular strand and semi-regular node areadded into the model, finally is an attack on the Internet KeyExchange (IKE) protocol as a case.
【免责声明】以下全部内容由[邓辉舫]上传于[2009年06月09日 17时13分45秒],版权归原创者所有。本文仅代表作者本人观点,与本网站无关。本网站对文中陈述、观点判断保持中立,不对所包含内容的准确性、可靠性或完整性提供任何明示或暗示的保证。请读者仅作参考,并请自行承担全部责任。
本学者其他成果
同领域成果