Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Science & Technology Information》 2010-05
Add to Favorite Get Latest Update

Application of Digital Signautre Based on ECC in Mobile Office

MA Sheng-hai(Dept.of Computer,Xi' an University of Science and Technology,Xi'an Shaanxi,710054 China)  
With the increasing popularity of the office automation network,as well as the rapid development of the wireless communications industry,people are gradually used to the new model that mobile office.but people in the enjoyment of flexibility and convenience that the mobile office brought,at the same time,a slight mistake may reveal confidential information of enterprises,communication content has been tampered or forged,security issues become a topic of concern.in this paper,the security requirements of mobile office as starting,elaborated the application of digital signautre based on ECC in mobile office,from the perspective of secure sockets layer discusses the advantages of digital signatures that based on ECDSA algorithm.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 SHANG Yan-hong,HOU Jin-feng(Department of Computer Science,Tangshan Teachers College,Tangshan 063000,China);Analysis and Forecast of Elliptic Curve Cryptosystem[J];Journal of Tangshan Teachers College;2012-05
【Citations】
Chinese Journal Full-text Database 4 Hits
1 LIU Zhi-hong, ZHANG Chun-hua (Dept. Automation, No. 58 Research Institute of China Ordance Industries, Mianyang 621000, China);Glancing Analysis about OA System Development Technology[J];Ordnance Industry Automation;2005-03
2 ZHANG Hua(Software Theory and System Institute, School of Software,Tsinghua University, Beijing 100084,China);Research and Realization of Wireless Communication Network Security Based on Public Key Infrastructure[J];Telecommunication Engineering;2005-01
3 Zhu Daofei1 Wang Dongyan1,2 Chen Qianbin1 Long Keping11(COIWIN,Chongqing University and Posts and Telecommunications,Chongqing 400065)2(Datang Mobile Communication Co.,Beijing 100083);The Analysis of Wireless LAN Security Protocol[J];Computer Engineering and Applications;2005-09
4 Gong Liying Wan Zhenkai(Computer College,Tianjin University of Industry,Tianjin 300160);Research of Digital Signature Based on ECC in E-government[J];Computer & Digital Engineering;2006-05
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 FENG Zhuo1, REN Ran2(1 Department of Automation, Tsinghua University, Beijing 100084, China; 2 Department of Electronic Engineering, Tsinghua University, Beijing 100084, China);Review on recent advancements and trends in information security[J];Journal of Safety and Environment;2007-02
2 CHEN Feng-lin1,HU Wan-bao2(1.School of Mathematics and Computational Science,Anqing teachers college,Anqing 246133,China);The Research of the Square Root Algorithm in Elliptic Curve Public-key Cryptography[J];Journal of Anqing Teachers College(Natural Science Edition);2010-03
3 WANG Jian JIANG Anping SHENG Shimin(Department of Microelectronics, Peking University, Beijing, 100871);A Dual Field Modular Inversion Algorithm and Hardware Implementation[J];Acta Scientiarum Naturalium Universitatis Pekinensis;2007-01
4 ZHANG Ni(Zhuzhou Vocational & Technological Institute of Hunan,Zhuzhou 412001);Application Based on Elliptic Curve Cryptosystem[J];Journal of Chongqing University of Science and Technology(Natural Sciences Edition);2007-03
5 ZHANG Li and YANG Yong-jian (College of Computer Science and Technology, Jilin University Changchun Jilin 130012);Application of ECMR Signature in the Mobile Electronic Commerce[J];Journal of University of Electronic Science and Technology of China;2009-S1
6 LI Zhi-tang,WU Yang(College of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan 430074,China);Dynamic encryption approach based on wireless network[J];Journal of Dalian University of Technology;2005-S1
7 Bai Yongxiang;Analysis of the Elliptic Curve Cryptosystem and Its Security[J];Computer Study;2007-05
8 XU Li-jun,LI Xiang(Institute of Computer Software and Theory,Guizhou University,Guiyang,Guizhou 550025,China);Design and realization of ECC on the standard C language[J];Computer and Information Technology;2006-06
9 BAI Yong-xiang1,2 (1.East China Normal University,Shanghai 200062,China;2.Wei Nan Polytechnic,WeiNan 714000,China);The Research of the Elliptic Curve Cryptosystem and Security[J];Computer Knowledge and Technology(Academic Exchange);2007-08
10 LV Cui-ying (School of computer and control,guilin university of electronic technology,Guilin,Guangxi 541004,China);Study of a digital watermarking scheme based on elliptic curve cryptography[J];Computer Security;2009-04
China Proceedings of conference Full-text Database 1 Hits
1 ZHANG Kai-fan;LI Feng-gao;School of Science,Hubei Univ.of Technology;;A High Efficient Digital Signature Scheme Based on Elliptic Curve Cryptography[A];[C];2009
【Co-references】
Chinese Journal Full-text Database 7 Hits
1 Tian Zi-jian Wang Ji-lin Wu Yun-xia (Information Research Institute,China University of Mining and Technology,Beijing 100083,China) (Information School,of Zhejiang University of Finance and Economics,Hangzhou 310012,China);A Dynamic Anonymous Authentication Scheme with Identity Escrow[J];Journal of Electronics and Information Technology;2005-11
2 SHANG Yan-hong,ZHANG Jing (Tangshan Teacher College, Hebei Tangshan 063000);An improved algorithm based on the Playfair encryption[J];CD Technology;2009-03
3 PENG Hua-Xi (State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080);An Identity-Based Authentication Model for Multi-Domain[J];Chinese Journal of Computers;2006-08
4 Xiang can (Department of Mathematics,Hainan Normal University,Hainan,Haikou,571158);Application of ECC smart card in E-trade security[J];Science & Technology Information;2008-20
5 CONG Qing-ri,HU Jin-chu(College of Information,Mechanical and Electrical Engineering,Shanghai Normal University,Shanghai 200234,China);Certification of communication based on ECC[J];Journal of Shanghai Normal University(Natural Sciences);2010-03
6 ZHU Jian-ming, MA Jian-feng (1. School of Computer, Xidian University, Xi抋n 710071, China; 2. State Key Laboratory of Information Security, Beijing 100039, China);An efficient authentication protocol with anonymity for wireless IP networks[J];Journal of China Institute of Communications;2004-06
7 PENG Hua-xi, FENG Deng-guo (State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences, Beijing 100080,China);Security flaws and improvement to a wireless authentication protocol with anonymity[J];Journal on Communications;2006-09
【Secondary References】
Chinese Journal Full-text Database 1 Hits
1 HUANG Chao-yang;TANG Bi-yu;Department of Information and Technology,Xiamen Ocean College;School of Computer and Information Engineering,Xiamen University;;Two-party authenticated key exchange protocol based on bilinear pairings[J];Computer Engineering and Design;2014-08
【Secondary Citations】
Chinese Journal Full-text Database 5 Hits
1 CHEN Xue-jun~(1,2),XUE Zhi~1,ZHOU Chao-meng~2 (1.Department of Electric Communication,Shanghai Jiaotong University,Shanghai 200030,China; 2. China Satellite Maritime Tracking and Control Department,Jiangyin 214431,China);WPKI Model and Implementation Method[J];Telecommunication Engineering;2004-06
2 ;Cryptographic System Based on Elliptic Curve[J];Computer Development & Applications;2004-03
3 SUN Hong,YANG Yi-xian (Information Security Center,Beijing Univ.of Posts & Telecomm,Beijing 100876,China);On the Security of Wireless Network Protocol 802.11[J];Acta Electronica Sinica;2003-07
4 ZHANG Yan, LIN Ying, HAO Lin (Department of Computer Science, College of Information, Yunnan University, Kunming 650091);Summarize of Elliptic Curve Cryptosystem Research[J];Computer Engineering;2004-03
5 Peng Jianfen (Dept. of Mathematics, Huazhong University of Science and Technology, Wuhan 430074);Algorithm for Compute KP in Elliptic Curve Cryptography[J];Communications Technology;2002-02
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved