期刊文献+

基于椭圆曲线密码体制的一种移动Agent安全方案研究

A Ecc-based Solution of Mobile Agent Protection
在线阅读 下载PDF
导出
摘要 移动Agent通信安全性是一个很重要的研究课题,需要进行深入研究.基于椭圆曲线密码体制已被广泛地应用于各种计算机安全中进行加密和数字签名,本文给出一种基于椭圆曲线密码体制通过加密函数来主动保护移动Agent的方案,并分析了此方案对安全需求的满足以及采取此方案的优势. The security of the mobile agent is a important research subject, which needs to be researched deeply. The Ecc - based solution has been applied to many fields of the cryptography and the digital signature. There is a ECC - based solution of mobile agent protection in this paper and this paper analyses the availability and the advantages of the solution.
作者 刘雷 李登道
出处 《泰山学院学报》 2006年第3期38-41,共4页 Journal of Taishan University
关键词 椭圆曲线密码系统 移动AGENT 加密函数 elliptic curve cryptography system mobile agent crytographied function
  • 相关文献

参考文献6

  • 1周文平,徐赐文,韩会朋,张霄.椭圆曲线密码体制的研究现状[J].中央民族大学学报(自然科学版),2005,14(3):228-235. 被引量:5
  • 2杨鲲,虞强源,郭欣,刘大有.安全的移动Agent系统体系结构——Jamogent[J].吉林大学自然科学学报,2000(1):32-36. 被引量:4
  • 3Uwe G Wilhelm;Sebastian Staamann;Levente Buttya?n.Introducing Trusted Third Parties to the Mobile Agent Paradigm,1999.
  • 4James Riordan;Bruce Schneier.Environmental Key Generation Towards Clueless Agents,1998.
  • 5Giovanni Vigna.Protecting Mobile Agents Through Tracing,1997.
  • 6Thomas Sander;Christian Tschudin.Protecting Mobile Agents Against Malicious Hosts,1998.

二级参考文献17

  • 1户军茹,韩益亮.椭圆曲线密码体制相关问题[J].通信技术,2003,36(12):151-152. 被引量:2
  • 2[16]Public Key Cryptography for Financial Service Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)[S]. ANSIX9.62- 1998, American Bankers Association, Working Draft, 1998.
  • 3[1]C E SHANNON. Communication Theory of Secrecy Systems[J]. Bill System Technical Journal, 1949,28(4) :656 - 715.
  • 4[2]WHITFIELD DIFFIE, MARTIN HELLMAN. New Directions in Cryptography[J]. IEEE Trans Inform. Theroy, 1976, IT-22: 644 - 654.
  • 5[3]RSA LABORATORIES. PKCS # 1-RSA Cryptography Standard[A]. Version 2.0, RSA Data Security[C]. 1998.
  • 6[4]NIST. FIPS PUB 186 - 1: Digital Signature Standard[A]. National Institute of Standards and Technology[C]. 1994.
  • 7[5]KOBLTTZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48:203 -209.
  • 8[6]MILLER V. Uses of elliptic curves in cryptography[J]. Lecture Notes in Computer Science, 1986, 218: 417 - 426.
  • 9[7]NEAL KOBLITZ. The State of Elliptic Curve Cryptography[J]. Designs、Codes and Cryptography, 2000, 19:173 - 193.
  • 10[10]DARREL HANKERSON, ALFRED MENEZES, SCOTT VANSTONE. Guide to Elliptic Curve Cryptography[ M ]. 2004.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部