期刊文献+

基于模糊综合评价法的移动商务身份认证评价 被引量:6

Security Analysis of Authentication Schemes in M-Commerce Based on Fuzzy Comprehensive Evaluation
下载PDF
导出
摘要 移动网络的开放性使得移动电子商务的信息安全问题更加突出,身份认证是解决这一问题的主要方法之一.对此提出了一种基于模糊综合评价法的指标评价体系,用于评价已有的移动电子商务身份认证方案的安全性.对该指标评价体系的仿真分析表明,该方法是一个定量化的、并且高效的评价方法. The openness and transformation mode of the mobile network poses a serious problem of information security in mobile commerce applications, and identity authentication is one of the main methods to solve the problem. An indicators analysis system of mobile commerce by using the fuzzy inference approach is proposed to evaluate different mobile commerce identity authentication schemes. Comprehensive simulation and comparsion show that the proposed indicator analysis systesm is quantified and efficient.
作者 李丹丹 华蕊
出处 《微电子学与计算机》 CSCD 北大核心 2016年第3期65-68,75,共5页 Microelectronics & Computer
基金 北京联合大学新起点项目(ZK10201502 SK10201409) 教育部人文社科项目(青年)(15YJCZH114) 北京市青年英才计划项目(YETP1761) 北京市哲社科项目(13JGC123)
关键词 身份认证 移动商务 模糊综合评价法 identity authentication M-commerce fuzzy comprehensive evaluation
  • 相关文献

参考文献9

  • 1Neuman B, Ts~ T. Kerberos: authentication service for computer networks [J]. IEEE Communication Magazine, 1994, 32(9): 33-38. 被引量:1
  • 2Charlott E, Markus F, Ivar J. A criteria-based evalua tion framework for authentication schemes [C] // IMS. ARES "09. International Conference on Availa bility, Reliability and Security. Barcelona, 2009 (3) : 865-869. 被引量:1
  • 3Patroklos Argyroudis G, Raja V, Hitesh T, et al. Performance analysis of cryptographic protocols on handheld devicesEC3//Third IEEE International Sym- posium on Network Computing and Applications. Los Aloamitos, 2004: 169-174. 被引量:1
  • 4Vipul G, Sumit G, Sheueling C, et al. Performance analysis of elliptic curve cryptography for SSL[M]. ACM Workshop on Wireless Security. USA, New York, 2002: 87-94. 被引量:1
  • 5周永彬,张振峰,冯登国.一种认证密钥协商协议的安全分析及改进[J].软件学报,2006,17(4):868-875. 被引量:16
  • 6谢志强,郭军,杨静.新型S/KEY认证方案的分析与设计[J].计算机工程,2009,35(5):175-176. 被引量:6
  • 7Kumar V K N. Mangipudi. New authentication and key agreement protocols for wireless applications[D].USA, State of Norh Dakota, North Dakota State University, 2005. 被引量:1
  • 8徐泽水,岳振军.模糊综合评价的两种新算法[J].解放军理工大学学报(自然科学版),2001,2(4):5-8. 被引量:26
  • 9Yang M, Runtong Z, Qin W, New authentication scheme for M-commerce based on two dimension bar code[C]// IEEE International Conference on Service Operations and Logistics, and Informatics. China, Beijing, 2008: 1029-1034. 被引量:1

二级参考文献16

  • 1高雪,张焕国,孙晓梅.一种改进的一次性口令认证方案[J].计算机应用研究,2006,23(6):127-128. 被引量:18
  • 2梁喆,方勇.融入混沌理论的一种OTP方案研究[J].计算机工程,2007,33(7):160-162. 被引量:6
  • 3Lamport L. Password Authentication with Insecure Communication[J]. Communications of the ACM, 1981, 24(11 ): 770-772. 被引量:1
  • 4Hailer N M. The S/Key One-time Password System[C]//Proceedings of the Internet Society Symposium on Network and Distributed System Security. San Diego, CA, USA: [s. n.], 1994. 被引量:1
  • 5Schneier B. Applied Cryptography-protocols Algorithms and Source Code in C[M]. New York, USA: John Wiley and Sons Inc., 1996. 被引量:1
  • 6王彩华,宋连天.模糊论方法论[M].北京:中国建筑工艺出版社,1988. 被引量:1
  • 7XU Z S,WEI C P.A consistency improving method in the analytic hierarchy process[J].European Journal of Operational Research.1999,116(1):443-449. 被引量:1
  • 8XU Z S.On consistency of the weighted geometric mean complex judgement matrix in AHP[J].European Journal of Operational Research.2000,126(3):683-687. 被引量:1
  • 9XU Z S.Generalized chi square method for the estimaton of weights[J].Journal of Optimization Theory and Applications.2000,107(1):183-192. 被引量:1
  • 10曾文艺,罗承忠,肉孜阿吉.区间数的综合决策模型[J].系统工程理论与实践,1997,17(11):48-50. 被引量:100

共引文献45

同被引文献40

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部