电子商务中的身份认证技术研究

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

电子商务中的身份认证技术研究作者:殷国宴学位授予单位:西安电子科技大学参考文献(77条)1.刘飞.张晓冬.杨丹制造系统工程20002.孙大涌先进制造技术20003.国家质量技术监督局质量管理体系标准20014.马健.唐晓青质量功能配置及其在机械制造行业中的应用1997(07)5.张申生敏捷制造的理论、技术与实践20006.RickDove.张申生敏捷企业(上)[期刊论文]-中国机械工程1996(3)7.幸研.易红.汤文成.钟秉林工作流技术在远程制造集成质量系统的应用研究[期刊论文]-制造业自动化2000(11)8.盛晓敏先进制造技术20009.YusufMsarjadi.AgunasekaranAgilemanufacturing:Thedrivers,conceptsandattributes1999(06)10.AGunasekaranAgilemanufacturing:Aframeworkforresearchanddevelopment1999(06)11.JM朱兰.杨文士朱兰论质量策划199412.高湘荣重新认识产品和质量一国外质量管理界的新动向1997(06)13.张弛.文放怀.张健现代企业品质管理技术200114.闫纪旺.蔡复之.万军集成质量系统发展战略的探讨1996(02)15.张根保现代质量工程200016.林志航计算机辅助质量系统199717.LWinterhalderCAQ-Integratingheute198918.杨鸿鹏.赵丽萍.林志航.曾晓流敏捷制造模式下的分布式计算机辅助质量信息系统[期刊论文]-计算机集成制造系统1998(4)19.MarreroW.ClarkeE.JhaSModelCheckingforSecurityProtocols20.Kyung-ahChangOpenAuthenticationModelSupportingElectronicCommerceinDistributedComputing21.JimCunningham.ShamimabiPauroballySatisfyingRequirementsforElectronicCommerce199822.GuntherPernul.AlexanderWRohm.GabyHerrmannTrustforElectronicCommerceTransactions199923.Yong-HoLee.Im-YeongLee.Hyung-WooLeeNewIdentityEscrowSchemeforAnonymityAuthentication200224.MuxiangZhangAdaptiveProtocolforEntityAuthenticationandKeyAgreementinMobileNetworks200425.AFiat.AShamirHowtoproveyourself:Practicalsolutionstoidentificationandsignatureproblem199726.YenSMCryptanalysisofAnAuthenticationandKeyDistributionProtocol199927.WilliamStallingsCryptographyandNetworkSecurity:PrinciplesandPractice199928.YamazakiY.KomatsuNAsecurecommunicationsystemusingbiometricidentifyverification200129.ZhangN.ShiQ.MerabtiMAnonymouspublic-keycertificatesforanonymousandfairdocumentexchange2000(147)30.MaoWBlindcertificationofpublickeysandoff-lineelectroniccash199631.MikeBurmester.YvoDesmedtSecureCommunicationinanUnknownNetworkUsingCertificates199932.SungKeunSong.HeeYongYoun.KangShinLeeANewDigitalSignatureandCertificateArchitecturewithShortestCertificationPath1998(04)33.OmarBatarfiCertificateValidationinUntrustedDomains199934.KyoungJeun.JongwookParkABestPracticeforRootCAKeyUpdateinPKI200335.赵军剖析智能卡[期刊论文]-内蒙古科技与经济2004(18)36.DaesungMoon.YounHeeGil.DosungAhnFingerprint-BasedAuthenticationforUSBTokenSystems200437.Eun-JunYoon.Eun-KyungRyu.Kee-YoungYooRebustRemoteUserAuthenticationScheme200438.CCChang.TCWuRemotepasswordauthenticationwithsmartcards1991(138)39.wHYang.SPShiehPasswordauthenticationschemeswithsmartcard1999(08)40.吕述望.王挺现代密码技术的应用局限[期刊论文]-计算机应用研究2000(7)41.BSchneierBiometrics:UsesandAbuses,InsideRisks1101999(08)42.InternationalBiometricsIndustryAssociation43.LucianoRila.ChrisJMitchellSecurityProtocolsforBiometrics-BasedCardholderAuthenticationinSmartcards200344.JohnArmington.PurdyHo.PaulKoznekBiometricAuthenticationinInfrastructureSecurity200245.AAbdul-Rahman.SHailesSupportingtrustinvirtualcommunities200046.FaragAzzedin.MuthucumaruMaheswaranEvolvingandManagingTrustinGridComputingSystems200247.ABaldwin.YBeres.SShiuTrustServices:ATrustInfrastructureforE-Commerce200148.CHPapadimitrion.VRangan.MSideriDesigningSecureCommunicationProtocolsfromTrustSpecifications199449.PVRanganAnAxiomaticTheoryofTrustinSecureCommunicationProtocols199950.FaragAzzedin.MuthucumaruMaheswaranTowardsTrust-AwareResourceManagementinGridComputingSystems200251.Abdul-RahmanA.HailesSAdistributedtrustmodel199852.BinYu.MunindarPSinghAnEvidentialModelofDistributedReputationManagement200253.Yao-HuaTanATrustMatrixModelforElectronicCommerce200354.ThomasBeth.MalteBorchedring.BKleinValuationofTrustinOpenNetworks55.SPMarshTrustinDistributedArtificialIntelligence56.郭银章.徐玉斌.曾建潮基于Agent代理机制的分布式应用系统研究[期刊论文]-计算机工程与应用2003(14)57.KarstenBsufka.StefanHoist.TorgeSchmidRealizationofallAgent-BasedCertificateAuthorityandKeyDistributionCenter199958.RPerlmanAnOverviewofPKITrustModels1999(13)59.BartJacob.LuisFerreira.NorbertBiebersteinEnablingApplicationsforGridComputingwithGlobus200360.LuisFerreira.ViktorsBerstis.JonathsnArmstrongIntroductiontoGridComputingwithGlobus200261.HYChien.JKJan.YMTsengAnefficientandpracticalsolutiontoremoteauthentication:smartcard2002(04)62.StuartSchechter.ToddParnell.AlexanderHarteminkAnonymousAuthenticationofMembershipinDynamicGroups199963.JClark.JJacobASurveyofAuthenticationProtocolLiterature:Version1.0199764.RFocardi.RGorrieri.FMartinelliNoninterferencefortheanalysisofcryptographicprotocols200065.JHeather.GLowe.SSchneiderHowtopreventtypeflawattacksonsecurityprotocols200066.GLoweBreakingandfixingtheNeedham-Schroederpublic-keyprotocolusingFDR199667.RMNeedham.MDSchroederAuthenticationrevisited1987(21)68.LawrenceCPaulsonRelationsbetweensecrets:Twoformalanalysesoftheyahalomprotocol2001(09)69.AlbertLevi.ErhanGetinta.MuratAydosRelayAttacksonBluetoothAuthenticationandSolutions200470.Wei-ChiKuAnImprovedID-BasedAuthenticationandKeyDistributionProtocol200271.AbdMananAhmad.NikNailahAbdullahUserAuthenticationviaNeuralNetwork200072.MAbadi.RNeedhamPrudentengineeringpracticeforcryptographicprotocols1996(22)73.WuWen.TakamichiSaito.FumioMizoguchiSecurityofPublicKeyCertificateBasedAuthenticationProtocols199774.MBurrows.MAbadi.RNeedhamAlogicofAuthentication75.王育民.刘建伟通信网的安全--理

1 / 70
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功