:::

詳目顯示

回上一頁
題名:Incorporating Robust Authentication Scheme in P2P E-Commerce Applications
書刊名:電子商務學報
作者:蔡建華 引用關係蘇品長
作者(外文):Tsai, Chien-huaSu, Pin-chang
出版日期:2012
卷期:14:4
頁次:頁597-617
主題關鍵詞:身分驗證對等互聯網路橢圓曲線密碼學AuthenticationPeer-to-peer networksElliptic curve cryptography
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:22
隨著點對點式(P2P)的技術崛起,使用者已運用這種互聯網的架構快速與便利 的從事各種電子商務(EC)上的應用。雖然這種網路架構具有自我組織的能力和彈 性,不過仍面臨來自開放通訊環境的威脅及挑戰,例如動態的拓撲結構、無線的連 結、自主漫遊的環境,均暴露其危險與弱點。如何辨識身份及使用端互相確認,實為重要的安全議題。本文提出了一種運用橢圓曲線密碼學的計算原理,並植基於身分加 密的認證機制,適用於這類P2P 無線及有線電腦通訊網路的環境,亦提供了增進安 全強度、快速且低耗量效果的優點,藉由本文認證機制加值於P2P 的架構,可以強固EC 環境的安全性顧慮。
Due to lack of effective trust management mechanism, heaps of deceptions exist in peer-to-peer (P2P) e-commerce (EC) environments, which seriously damage authenticity and availability of the systems. There are various challenges that are faced in the open autonomous environments. These existing challenges are mostly owing to the scarcity of correct authentication in P2P networks. Generally speaking, structured P2P networks are assumed to be accessible by allowing heterogeneous nodes or clients to interact and share one another. The identity (ID) authentication problem for this type of network has now become important. The paper presents a specific authentication key exchange scheme for P2P networks. Theoretic analysis shows that, a robust evaluation scheme based on elliptic curve cryptography (ECC) is proposed for P2P e-commerce networks with better secure identifying-and-authenticating features.
期刊論文
1.Perlman, Radia(199911)。An Overview of PKI Trust Models。IEEE Network,November/December,38-43。  new window
2.Lenstra, Arjen K.、Verheul, Eric R.(2001)。Selecting cryptographic key sizes。Journal of Cryptology,14(4),255-293。  new window
3.Koblitz, Neal(1987)。Elliptic Curve Cryptosystems。Mathematics of Computation,48(177),203-209。  new window
會議論文
1.Rowstron, A.、Druschel, P.(2001)。Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems。IFIP/ACM International Conference on Distributed Systems Platforms。Heidelberg, Germany:Springer。329-350。  new window
2.Miller, Victor S.(1986)。Use of Elliptic Curves in Cryptography。CRYPTO 1985: Conference on the Theory and Application of Cryptographic Techniques。Springer-Verlag。417-426。  new window
3.Stoica, I.、Morris, R.、Karger, D.(2001)。Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications。ACM SIGCOMM,149-160。  new window
4.Ratnasamy, S.、Francis, P.、Handley, M.、Karp, R.、Shenker, S.(2001)。A Scalable Content-Addressable Network。ACM SIGCOMM。San Diego, CA:Association for Computing Machinery。161-172。  new window
其他
1.Bresson, E., Chevassut, O., and Pointcheval, D.(2007)。Provably secure authenticated group Diffie-Hellman key exchange。  new window
2.Castro, M., Druschel, P., Ganesh, A., Rowstron, A., and Wallach, D. S.(2002)。Secure routing for structured peer-to-peer overlay networks。  new window
3.Chou, C.C., Wei, S.L., Kuo, C.C., and Naik, K.(2007)。An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks。  new window
4.Dingledine, R., Freedman, M., and Molnar, D.(2000)。The FreeHaven project: Distributed anonymous storage service。  new window
5.Fahrenholtz, D. and Lamersdorf, W.(2002)。Transactional security for a distributed reputation management system。  new window
6.Friedman, A. and Camp, L.J.(2005)。Security in peer to peer systems。  new window
7.Gorantla, M.C., Gangishetti, R., and Saxena, A(2005)。A survey on ID-based cryptographic primitives。  new window
8.Groove Networks.(2002)。A white paper: Groove security architecture。  new window
9.Lee, H. and Kim, K.(2003)。An adaptive authentication protocol based on reputation for peer-to-peer system。  new window
10.Li, P., Lin, Y., and Zeng, W.(2006)。Search on security in sensor networks。  new window
11.Lu, L., Han, J., Hu, L., Huai, J., Liu Y., and Ni, L.M.(2007)。Pseudo trust: Zeroknowledge based authentication in anonymous peer-to-peer protocols。  new window
12.Lua, E.K. and Crowcroft, J.(2004)。A survey and comparison of peer-to-peer overlay network schemes。  new window
13.MacQuire, A., Brampton, A., Rai, I.A., Race, N.J.P., and Mathy, L.(2008)。Authentication in stealth distributed hash tables。  new window
14.Milanovic, N., Malek, M., Davidson, A., and Milutinovic, V.(2004)。Routing and security in mobile ad hoc networks。  new window
15.Mitchell, C.J.(2003)。Public key encryption using block ciphers。  new window
16.Sit, E. and Morris, R.(2002)。Security considerations for peer-to-peer distributed hash tables。  new window
17.Su, P.C. and Tsai, C.H.(2010)。Self-certified key exchange scheme based on hybrid mode problems。  new window
18.Takano, Y., Isozaki N., and Shinoda, Y.(2006)。Multipath key exchange on P2P networks。  new window
19.Weimerskirch, A. and Westhoff, D.(2003)。dentity certified authentication for ad-hoc networks。  new window
20.Wong, F.L. and Stajano, F.(2007)。Multichannel security protocols。  new window
21.Xiao, L., Xu, Z., and Zhang, X.(2003)。Low-cost and reliable mutual anonymity protocols in peer-to-peer networks。  new window
22.Zhou, L. and Haas, Z.J.(1999)。Securing ad hoc networks,。  new window
23.Zimmermann, P.(2001)。PGP 7.0 User’s Guide。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE