会议专题

SECURITY ELECTRONIC COMMERCE PROTOCOL BY THE THIRD KIND ENTITIES

In e-commerce protocols, malicious participants misbehave on their benefits. There is some work in analysis the application-protocols but little similar work about the foundation-protocols. To fill the gap we use semi-regular entities to denote the entities different from penetrators that participate in the protocol on behalf of themselves such as customers in e-commerce. A method in strand space model is also presented. After descriptions of hash and Diffie-Hellman exchange, semi-regular strand and semi-regular node are added into the model, finally is an attack on the Internet Key Exchange (IKE) protocol as a case.

Semi-regular entity Strand space TLS IKE

JIE YANG HUI-FANG DENG

School of Computer Science and Engineering, South China University of Technology, Guangzhou 510006, China

国际会议

2006 International Conference on Machine Learning and Cybernetics(IEEE第五届机器学习与控制论坛)

大连

英文

4438-4443

2006-08-13(万方平台首次上网日期,不代表论文的发表时间)