首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
基于SSL协议的表单数字签名模型研究   总被引:1,自引:0,他引:1  
以电子商务软件开发为背景,研究在SSL协议基础上实现表单数字签名模型的原理与方法。首先给出SSL协议与应用集成模型,提出一种协议实现策略;进而探讨数字签名基本原理以及DSA数字签名算法,给出基于SSL协议的表单数字签名模型软件构架;最后针对提出的SSL协议实现策略给出具体实现方法,并采用体系结构描述语言ACME定义表单数字签名模型的构架模板,所提出的模型有效地克服SSL协议缺乏数字签名能力的缺陷,为电子商务提供更高的安全保障。  相似文献   

2.
论文在论述数字水印应用面临的攻击和DHWM协议存在安全隐患的基础上,提出了一种新的基于数字签名的安全数字水印协议。该协议引入数字证书,将数字签名、时间戳和水印信息一起嵌入到数字图像中。通过安全性分析和性能分析,该协议能抵抗中间人攻击、解释攻击,并能检测数字图像是否被非法篡改,可实际应用于数字图像的版权保护。  相似文献   

3.
提出一种将椭圆曲线密码系统身份认证协议应用GSM网络上进行身份认证的控制方法,采用CA证书机制,应用离线获取证书,在线相互认证提高GSM网络系统安全性,应用无求逆数字签名方案实现CA认证,简化了计算复杂度,并通过通讯双方数字签名实现不可抵赖性,最后给出了协议安全分析,提出的认证协议具有保密性高及传输参数少的优点,较容易在无线移动通讯系统软硬件中实现。  相似文献   

4.
椭圆曲线密码体制在SET协议中的应用   总被引:2,自引:0,他引:2  
林霞  朱艳琴 《微机发展》2005,15(2):58-60
分析了电子商务中SET协议的运作方式,针对SET交易每个阶段要用加密和数字签名保证其安全进行的要求,设计了一套椭圆曲线密码体制在SET协议中的应用方案,其中包括ECC的密钥生成、数字签名和数字信封的实现算法。给出了一个SET交易的安全实现模型,它保证了交易的有效性、机密性、完整性和不可抵赖性。  相似文献   

5.
一个基于交互式零知识证明的身份鉴别和数字签名协议   总被引:6,自引:0,他引:6  
提出一个新的基于零知识证明的身份鉴别和数字签名协议,该协议的安全性建立在对大数的因子分解和RSA加密算法破解的难度上的,该协议可以被方便地应用到智能卡系统中去,与Nyang的协议相比,此协议在通信量与前者相当,而且要达到零知识主明所需要的轮数比Nyang的协议要少,在相同轮数情况下该协议可以提供比Nyang的协议更高的安全性能,在一轮循环情况下协议可以达到的最高安全程度与用户身份无关,还将协议应用于实现数字签名、多人数字签名和(N,T)门限数字签名协议。  相似文献   

6.
分析了电子商务中SET协议的运作方式,针对SET交易每个阶段要用加密和数字签名保证其安全进行的要求,设计了一套椭圆曲线密码体制在SET协议中的应用方案,其中包括ECC的密钥生成、数字签名和数字信封的实现算法.给出了一个SET交易的安全实现模型,它保证了交易的有效性、机密性、完整性和不可抵赖性.  相似文献   

7.
MOSS安全电子邮件协议提供对MIME对象进行数字签名和数据加密的服务。本文基于MOSS协议设计实现了一个Web安全电子邮件客户端系统,描述了系统结构、邮件发送和邮件接收的全过程,重点分析了MOSS协议的数字签名和数据加密服务在系统中的设计与实现。  相似文献   

8.
可证明安全性理论与方法研究   总被引:46,自引:1,他引:46  
冯登国 《软件学报》2005,16(10):1743-1756
论述了可证明安全性理论在安全方案与安全协议的设计与分析中的应用,内容主要包括:什么是可证明安全性,可证明安全性理论涉及到的一些基本概念,RO(random oracle)模型方法论的基本思想及其在公钥加密和数字签名等方案中的应用研究进展,标准模型下可证明安全性理论在公钥加密和数字签名等方案中的应用研究进展,以及可证明安全性理论在会话密钥分配协议的设计与分析中的应用研究进展.  相似文献   

9.
数字签名技术及其发展动态   总被引:13,自引:0,他引:13  
在信息化的今天,人们倍加重视信息的安全问题,数字签名技术作为信息安全领域的一项重要技术,应用日益广泛。详细论述了传统数字签名的作用、实现技术及其应用,并介绍了当前数字签名的几种新技术,展望了这一领域发展前景。  相似文献   

10.
IKE协议是IPSec协议族中的自动密钥交换协议,用于动态地建立安全关联。在IKE协议中采用的D-H交换极易受到中间人攻击的威胁。通过深入研究中间人攻击的实现原理,并结合IKE协议中数字签名认证、公钥加密认证、预共享密钥认证三种认证方式详细论述了在该协议中是如何利用身份认证技术抵抗中间人攻击。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号