SECURITY ELECTRONIC COMMERCE PROTOCOL BY THE THIRD KIND ENTITIES
In e-commerce protocols, malicious participants misbehave on their benefits. There is some work in analysis the application-protocols but little similar work about the foundation-protocols. To fill the gap we use semi-regular entities to denote the entities different from penetrators that participate in the protocol on behalf of themselves such as customers in e-commerce. A method in strand space model is also presented. After descriptions of hash and Diffie-Hellman exchange, semi-regular strand and semi-regular node are added into the model, finally is an attack on the Internet Key Exchange (IKE) protocol as a case.
Semi-regular entity Strand space TLS IKE
JIE YANG HUI-FANG DENG
School of Computer Science and Engineering, South China University of Technology, Guangzhou 510006, China
国际会议
2006 International Conference on Machine Learning and Cybernetics(IEEE第五届机器学习与控制论坛)
大连
英文
4438-4443
2006-08-13(万方平台首次上网日期,不代表论文的发表时间)