:::

詳目顯示

回上一頁
題名:結合NTRU公開金鑰密碼系統與行動條碼以強化交易安全機制
書刊名:資訊、科技與社會學報
作者:張浩銘陳志誠簡銘成
出版日期:2016
卷期:16:1/2
頁次:頁49-64
主題關鍵詞:行動商務資訊安全公開金鑰密碼系統行動條碼NTRUMobile commerceInformation securityNTRU cryptosystemQuick response code
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:3
期刊論文
1.黃信捷(19960600)。電子資料交換EDI在圖書出版與圖書館編目自動化之應用--以「二維條碼」之應用談起。圖書館管理學報,2,73-87。  延伸查詢new window
2.Rivest, R.、Shamir, A.、Adleman, L.(1978)。A method for obtaining digital signatures and public-key cryptosystem。Communications of the ACM,21(2),120-126。  new window
3.Sun, H. M.(2000)。Design of time-stamped proxy signature with traceable receivers。IEE proc. Computers & Digital Techniques,147(6),462-466。  new window
4.Tan, J. S.(2002)。QR Code: the 2D code of 21st century and its applications。Information Technology Standards Committee Synthesis Journal,7-14。  new window
5.Tan, C. H.、Teo, J. C. M.(2007)。Protection Against Web-based Password Phishing。Information Technology,754-759。  new window
會議論文
1.Shand, M.、Vuillemin, J.(1993)。Fast Implementations of RSA Cryptography。The 11th IEEE Symposium on Computer Arithmetic。Los Alamitos, CA.:Windsor, Ontario。252-259。  new window
2.Coppersmith, D.、Shamir, A.(1997)。Lattice attacks on NTRU。Eurocrypt ‘97, LNCS。Springer-Verlag。52-61。  new window
3.Gouda, M. G.、Liu, A. X.(2004)。Formal Specification and Verification of a Micropayment Protocol。13th International Conference on Computer Communications and Networks。Rosemont, Illinois。489-494。  new window
4.Hasan, A.、Raygan, K.(2007)。A Mobile Telephone Based, Secure Micro-Payment Technology using the Existing ICT Infrastructure22-24。  new window
5.Hoffstein, J.、Silverman, J. H.(2000)。Optimization for NTRU。Public-Key Cryptography and Computational Number Theory。Warsaw。  new window
6.Hwang R. J.、Su, F.-F.、Yeh, Y.-S.、Chen, C.-Y.(2005)。An efficient decryption method for RSA cryptosystem。The 19th AINA Int. Conf. on Advanced Information Networking and Applications。Taipei。585-590。  new window
7.Price, S. M.(2007)。Protecting Privacy Credentials from Phishing and Spyware Attacks。Information Assurance and Security Workshop,167-174。  new window
8.Nayak, R.、Sastry, C. V.、Pradhan, J.(2008)。A matrix formulation for NTRU cryptosystem。IEEE ICON 2008。  new window
9.Sun H. M.、Chen, B. J.(1999)。Time-stamped proxy signatures with traceable receivers。The ninth national conference on Information security,247-253。  new window
10.Seino, K.、Kuwabara, S.、Mikami, S.、Takahashi, Y.、Yoshikawa, M.、Narumi, H.、Koganezaki, K.、Wakabayashi, T.、Nagano, A.(2004)。Development of the traceability system which secures the safety of fishery products using the QR Code and a digital signature。MTS/IEEE TECHNO-OCEAN。Kobe。476-481。  new window
11.Yang, C. N.、Yen, C. E.、Wang, C. H.、Chen, C. M.、Chen, T. S.、Lee, Y. F.(2007)。Campus Micropayment System by Mobile Barcode。TANET 2007。  new window
研究報告
1.Hoffstein, J.、Silverman, J. H.(1998)。Implementation Notes for NTRU PKCS Multiple Transmissions。  new window
2.Hoffstein, J.、Silverman, J. H.(2000)。Protecting NTRU Against Chosen Ciphertext and Reaction Attacks。  new window
3.Howgrave-Graham N.、Silverman, J. H.、Whyte, W.(2003)。A meet-in-the-middle attack on an NTRU private key。  new window
4.Hoffstein, J.、Silverman, J. H.(1999)。Reaction Attacks Against the NTRU Public Key Cryptosystem。  new window
5.Silverman, J. H.(1998)。Plaintext awareness and the NTRU PKCS。  new window
6.Silverman, J. H.(1999)。Wraps, Gaps, and Lattice Constants。  new window
學位論文
1.翁仍方(2008)。行動條碼加密機制之研究(碩士論文)。大同大學。  延伸查詢new window
2.余宗憲(2013)。運用行動條碼結合線上整合式售票系統之研究(碩士論文)。南台科技大學。  延伸查詢new window
3.簡銘成(2011)。行動條碼整合NTRU公開金鑰密碼系統之防偽機制(碩士論文)。大同大學。  延伸查詢new window
圖書
1.Nayak, R.、Sastry, C. V.、Pradhan, J.(2010)。Algorithmic Comparison between Polynomial Base and Matrix Base NTRU Cryptosystem。IJCNS。  new window
圖書論文
1.Hoffstein, J.、Pipher, J.、Silverman, J. H.(1998)。NTRU: A Ring-Base Public Key Cryptosystem。Algorithmic Number Theory (ANTS III), Lecture Notes in Computer Science。Berlin:Springer-Verlag。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE