DocumentCode :
2900490
Title :
Security Electronic Commerce Protocol by the Third Kind Entities
Author :
Yang, Jie ; Deng, Hui-fang
Author_Institution :
Sch. of Comput. Sci. & Eng., South China Univ. of Technol., Guangzhou
fYear :
2006
fDate :
13-16 Aug. 2006
Firstpage :
4438
Lastpage :
4443
Abstract :
In e-commerce protocols, malicious participants misbehave on their benefits. There is some work in analysis the application-protocols but little similar work about the foundation-protocols. To fill the gap we use semi-regular entities to denote the entities different from penetrators that participate in the protocol on behalf of themselves such as customers in e-commerce. A method in strand space model is also presented. After descriptions of hash and Diffie-Hellman exchange, semi-regular strand and semi-regular node are added into the model, finally is an attack on the Internet key exchange (IKE) protocol as a case
Keywords :
Internet; cryptography; electronic commerce; protocols; Diffie-Hellman exchange; Internet key exchange protocol; application protocol; foundation protocol; hash function; security electronic commerce protocol; semiregular entity; strand space model; Authentication; Computer science; Computer security; Contracts; Cryptographic protocols; Cybernetics; Electronic commerce; Electronic mail; Internet; Machine learning; Protection; Security; Software tools; IKE; Semi-regular entity; Strand space; TLS;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Machine Learning and Cybernetics, 2006 International Conference on
Conference_Location :
Dalian, China
Print_ISBN :
1-4244-0061-9
Type :
conf
DOI :
10.1109/ICMLC.2006.259098
Filename :
4028853
Link To Document :
بازگشت