Research on key escrow technology Based on software

被引:0
|
作者
Yu, Zhengli [1 ]
机构
[1] Univ Liverpool, Dept Comp Sci, Liverpool L69 3BX, Merseyside, England
关键词
D O I
10.1088/1742-6596/1168/3/032131
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid development of e-commerce, security issues have attracted more and more attention. In this paper, PKI-based electronic commerce security key escrow technology and protocol are studied, the role of PKI in e-commerce security and the application characteristics of PKI are explained, and the design scheme of a digital authentication system based on PKI is described.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] A dynamic threshold commercial key escrow scheme based on conic
    Long, Y
    Cao, ZF
    Chen, KF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 171 (02) : 972 - 982
  • [42] Research of software reusing technology based on object
    Sun, Dalie
    Yang, Jing
    Wang, Zili
    Harbin Jianzhu Daxue Xuebao/Journal of Harbin University of Civil Engineering and Architecture, 2000, 33 (03): : 111 - 113
  • [43] Based on the software development of network technology research
    Fudong
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 178 - 180
  • [44] Research of Software Reuse Technology Based on Component
    Du XianFeng
    Qiang ZanXia
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, : 447 - 450
  • [45] Design of software error detection system based on SPARC V8 and research on the key technology
    Huang, Chunmei
    Jiang, Chunmao
    Qu, MingCheng
    Computer Modelling and New Technologies, 2014, 18 (06): : 65 - 71
  • [46] Research on Key Technology of Animation Scene Based on Computer Technology
    Xin, Guo
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 699 - 702
  • [47] Key Escrow from a Safe Distance
    Blaze, Matt
    27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 317 - 321
  • [48] Key escrow encryption: the third paradigm
    Denning, Dorothy E.
    Computer Security Journal, 11 (01): : 43 - 52
  • [49] Verifiable partial key escrow scheme
    Beijing Youdian Xueyuan Xuebao, 3 (72-75):
  • [50] Commercial Key Escrow: An Australian perspective
    Caelli, WJ
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 40 - 64