期刊文献+

医疗电子认证系统设计与应用 被引量:2

Design and Application of Medical Electronic Authentication System
下载PDF
导出
摘要 介绍各电子签名方案特点及选择方法,阐述基于手机盾的电子签名系统架构设计、手机盾认证系统技术原理及应用,为相关研究提供参考。 The paper introduces the characteristics and selection methods of various electronic signature schemes,expounds the architecture design of electronic signature system based on mobile phone shield,the technical principle of mobile phone shield authentication system and the application of the system,and provides references for related study.
作者 刘振峰 LIU Zhenfeng(Anhui Provincial Cancer Hospital,Hefei 230001,China)
机构地区 安徽省肿瘤医院
出处 《医学信息学杂志》 CAS 2021年第10期72-76,共5页 Journal of Medical Informatics
关键词 手机盾 电子认证 电子签名 mobile phone shield electronic authentication electronic signature
  • 相关文献

参考文献6

二级参考文献38

  • 1Ritchie 0 M,Thompson K. The UNIX time-sharing system [ J ]. BellSystem Technical Journal, 1978,57(6): 1905-1929. 被引量:1
  • 2Qiu Lili, Zhang Yin, Wang Feng, et al. Trusted computer systemevaluation criteria [ S ]. [ S. 1. ] : National Computer Security Center,1985. 被引量:1
  • 3Barrera D, Kayacik H G, Van Oorschot P C, ei al. A methodologyfor empirical analysis of permission-based security models and its ap-plication to Android[ C ] //Proc of the 17th ACM Conference on Com-puter and Communications Security. New York : ACM Press, 2010 :73-84. 被引量:1
  • 4Felt A P, Greenwood K, Wagner D. The effectiveness of install-timepermission systems for third-party applications, UCB/EECS-2010-143[R]. Berkeley: University of California, 2010. 被引量:1
  • 5Felt A P, Ha E, Egelman S, et al. Android permissions: user atten-tion, comprehension, and behavior[ C ] //Proc of the 8th Symposiumon Usable Privacy and Security. New York : ACM Press, 2012 : 3. 被引量:1
  • 6Nauman M, Khan S, Zhang X. Apex: extending Android permissionmodel and enforcement with user-defined runtime constraints [ C ]//Proc of the 5th ACM Symposium on Information, Computer and Com-munications Security. New York:ACM Press, 2010: 328-332. 被引量:1
  • 7Conti M,Nguyen V T N, Crispo B. CRePE: context-related policyenforcement for Android [ M ] //Information Security. Berlin : Sprin-ger, 2011: 331-345. 被引量:1
  • 8Ongtang M,McLaughlin S,Enck W,et al. Semantically rich appli-cation-centric security in Android [ J ]. Security 3nd Communica-tion Networks, 2012, 5(6) : 658-673. 被引量:1
  • 9Davi L, Dmitrienko A, Sadeghi A R, ef al. Privilege escalationattacks on Android [ M ]//Information Security. Berlin : Springer,2011: 346-360. 被引量:1
  • 10Dietz M, Shekhar S, Pisetsky Y,et al. QUIRE : lightweight prove-nance for smart phone operating systems [ C ] //Proc of the 20 th USE-NIX Security Symposium. 2011. 被引量:1

共引文献40

同被引文献24

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部