期刊文献+

基于离线可信第三方的挂号电子邮件协议研究

Certified E-mail protocol based on off-line TTP
在线阅读 下载PDF
导出
摘要 电子商务中的一些协议大多建立在可信第三方TTP(Trusted Third Party)的基础上,挂号电子邮件协议采用的离线TTP协议在某种程度上解决了TTP的瓶颈问题。但该协议存在某些缺陷,着重分析该缺陷造成的各个参与方的不公平性以及可能存在的攻击方法,并给出对应的解决方法和改进建议。 Most protocols of dectronic commerce are made upon Trusted Third Party (TIP). To use off-llne TiP protocol for the certified E-mall protocol solves the TIP bottleneck problem in some degree. But this protocol has certain limitations. Unfairness to each side caused by these limitations and possible attack means were analyzed in detail. Meanwhile, corresponding solutions and suggestions for improvement were made.
作者 李慧
出处 《计算机应用》 CSCD 北大核心 2006年第8期1836-1837,1847,共3页 journal of Computer Applications
关键词 可信第三方 挂号电子邮件协议 公平性 Trusted Third Party(TIP) certified E-mall protocol fairness
  • 相关文献

参考文献5

  • 1BLUM M.How to Exchange Secret Keys[J].ACM Transactions on Computer Systems,1983,1 (2):175-193.
  • 2DENG RH,GONG L,LAZAR AA,et al.Practical protocols for certified electronic mail[J].Journal of network and systems management,1996,4(3):279-297.
  • 3ZHOU J,GOLLMANN D.A fair non-repudiation protocol[A].Proceedings of 1996 IEEE Symposium on security and Privacy[C].1996.55-61.
  • 4ASOKAN N,SHOUP V,WAIDNER M.Asynchronous protocols for optimistic fair exchange[A].Proceedings of IEEE Symposium on Research in Security and Privacy[C].1998.86 -99.
  • 5卿斯汉.电子商务协议中的可信第三方角色[J].软件学报,2003,14(11):1936-1943. 被引量:31

二级参考文献13

  • 1卿斯汉.安全协议的设计与逻辑分析.软件学报,2003,14(7):1300~1309.http://www.jos.org.cn/1000-9825/14/1300.htm.,.
  • 2卿斯汉.安全协议20年研究进展.软件学报, 2003,14(10):1740~1752.http://www.jos.org.cn/1000-9825/14/1740.htm.,.
  • 3ISO/IEC 3rd CD 13888-1. Information technology-Security techniques Part 1: General model. ISO/IEC JTC11/SC24 N1274, 1996.
  • 4Burrows M, Abadi M, Needham R. A logic of authentication. ACM Transactions on Computer Systems, 1990,8(1):18-36.
  • 5Kailar R. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering, 1996,22(5):313-328.
  • 6Coffey T, Saidha P. Non-Repudiation with mandatory proof of receipt. Computer Communication Review, 1996,26(1):6- 17.
  • 7Deng RH, Gong L, Lazar AA, Wang W. Practical protocols for certified electronic mail. Journal of Network and Systems Management, 1996,4(3):279-297.
  • 8Asokan N, Shoup V, Waidner M. Asynchronous protocols for optimistic fair exchange. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998. 86-99.
  • 9卿斯汉.安全协议20年研究进展.软件学报,2003,14(10):1740-1752[EB/OL].http://www.jos.org.cn/1000-9825/14/1740.htm.,.
  • 10卿斯汉.安全协议的设计与逻辑分析.软件学报,2003,14(7):1300-1309[EB/OL].http://www.jos.org.cn/1000-9825/14/1300.htm.,.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部