首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到4条相似文献,搜索用时 31 毫秒
1.
The multiagent negotiation testbed proposed by Collins was modified. It utilizes publish/subscribe system, timerelease cryptography and anonymous communication. The proposed protocol reduces DOS attack and avoids replay data attack by providing ticket token and deal sequence number to the supplier. And it is proved that generating random number to the supplier by market is better than the supplier doing it by him in guaranteeing anonymity. Market publishes an interpolating polynomial for sharing the determination process data. It avoids collusion between a customer and a certain supplier. According to the comparison and analysis with other protocols, the proposed protocol shows good security and better efficiency.  相似文献   

2.
The multi-agent negotiation test-bed proposed by Collins was modified. It utilizes publish/subscribe system, time-release cryptography and anonymous communication. The proposed protocol reduces DOS attack and avoids replay data attack by providing ticket token and deal sequence number to the supplier. And it is proved that generating random number to the supplier by market is better than the supplier doing it by him in guaranteeing anonymity. Market publishes an interpolating polynomial for sharing the determination process data. It avoids collusion between a customer and a certain supplier. According to the comparison and analysis with other protocols, the proposed protocol shows good security and better efficiency.  相似文献   

3.
Digital watermarking is the enabling technology to prove ownership on such copyrighted product as software, documents, music, and video, monitor the usage of them, and even trace them back to the user with embedding of unique buyer identification(ID) as a part of watermark into them. This thread of detection will deter users from releasing unauthorized copies. A problem arises when the seller is dishonesty, he has a chance to use the digital watermarking with the buyer ID maliciously and make the buyer receive falseaccusation. In this paper, an improved digital watermarking scheme is introduced to prevent falseaccusation to an honest buyer, which is combined with the advantage of PKC(public key certificate) so that it fits the online transaction and helps to realize secure ecommerce. In addition, the extended application of this scheme is discussed.   相似文献   

4.
采用外包计算技术构造一种基于密文策略的属性加密数据访问控制方法,具有高效的属性撤销功能,可以减少用户的计算量和通信量.其最大特点是将解密秘钥分为两部分,一部分发送给云服务器,另一部分发送给用户,使得云服务器可以帮助用户解密密文,减少了用户计算量,也减少了用户和云服务器的通信量.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号