Title : 
Security Electronic Commerce Protocol by the Third Kind Entities
         
        
            Author : 
Yang, Jie ; Deng, Hui-fang
         
        
            Author_Institution : 
Sch. of Comput. Sci. & Eng., South China Univ. of Technol., Guangzhou
         
        
        
        
        
        
            Abstract : 
In e-commerce protocols, malicious participants misbehave on their benefits. There is some work in analysis the application-protocols but little similar work about the foundation-protocols. To fill the gap we use semi-regular entities to denote the entities different from penetrators that participate in the protocol on behalf of themselves such as customers in e-commerce. A method in strand space model is also presented. After descriptions of hash and Diffie-Hellman exchange, semi-regular strand and semi-regular node are added into the model, finally is an attack on the Internet key exchange (IKE) protocol as a case
         
        
            Keywords : 
Internet; cryptography; electronic commerce; protocols; Diffie-Hellman exchange; Internet key exchange protocol; application protocol; foundation protocol; hash function; security electronic commerce protocol; semiregular entity; strand space model; Authentication; Computer science; Computer security; Contracts; Cryptographic protocols; Cybernetics; Electronic commerce; Electronic mail; Internet; Machine learning; Protection; Security; Software tools; IKE; Semi-regular entity; Strand space; TLS;
         
        
        
        
            Conference_Titel : 
Machine Learning and Cybernetics, 2006 International Conference on
         
        
            Conference_Location : 
Dalian, China
         
        
            Print_ISBN : 
1-4244-0061-9
         
        
        
            DOI : 
10.1109/ICMLC.2006.259098