期刊文献+

Design of PKI-based mobile bank security system

Design of PKI-based mobile bank security system
下载PDF
导出
摘要 With the development of the wireless network technology, the wireless band becomes more and more wide, and the development of the microelec-tronic technology has also improved the computati-onal speed and memory capacity of the mobile devices. They brought the infinite prospects for the wireless mobile e-commerce. However security is key to lau-nching mobile e-business. Public key infrastructure(PKI) can satisfy mobile e-business security’s requirement. The suitable asymmetrical encryption and signature algorithm were selected, and simply SSL so that PKI can provide better secure information between client and client server. With the development of the wireless network technology, the wireless band becomes more and more wide, and the development of the microelec- tronic technology has also improved the computati- onal speed and memory capacity of the mobile devices. They brought the infinite prospects for the wireless mobile e-commerce. However security is key to lau - nching mobile e-business. Public key infrastructure[PKI) can satisfy mobile e-business security's requirement. The suitable asymmetrical encryption and signature algorithm were selected, and simply SSL so that PKI can provide better secure information between client and client server.
出处 《重庆邮电大学学报(自然科学版)》 2007年第3期381-385,共5页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
关键词 设计 无线网络 微电子技术 电子商务 许可证 公钥基础设施 电子银行 安全系统 PKI mobile e- business certificate SSL ECL wirless network
  • 相关文献

参考文献6

  • 1[1]GAZIS V,HOUSOS N,ALONISTIOTI A.Generic systems architecture for 4G mobile comm[EB/OL].(2003-02-15)[2007-01-10].http://ieeexplore.ieee.org/ie15/8574/27150/01207073.pdf.
  • 2[2]WANG Shun-man,TAO Ran,WANG Yue.Security Analysis on Mobile E-commerce[EB/OL].(2003-02-14)[2007-01-10].http://ieeexplore.ieee.org/ie15/9313/29613/01349102.pdf.
  • 3[3]HSIUNG H,SCHEURICH S,FERRANTE F.Bridging E-Business and Added Trust:keys to E-Business Growth[EB/OL].(2001-02-10)[2007-10-10].http://ieeexplore.ieee.org/ie15/6294/19853/00918219.pdf?arnumber=918219.
  • 4[4]SCHNEIER B.Applied Cryptography:Protocols,algorithms and source code in C,2nd Edition[M].US:John Wiley and Sons,1995.
  • 5[5]CHANSON S T,CHEUNG T.Design and Implementation of a PKI-Based End-to-End Secure Infrastructure for Mobile e-Commerce[EB/OL].(2001-01-20)[2007-01-10].http://portal.acm.org/citation.cfm?id=598690.598764 & cou=GUIDE&dc=ACM.
  • 6[6]KIM J Y,KIM E C.Wired and wireless network integration for the 4G mobile comm.systems[EB/OL].(2004-09-10)[2007-01-10].http://ieeexplore.ieee.org/xplore/loginconcurrency.jsp?urc=/ie15/9073/28768/01292867.pdf.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部