The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Blind decoding schemes are proposed as tools for protecting customerspsila privacy in on-line shopping for electronic documents such that the company has no way of knowing which documents the customers have purchased. Most of the blind decoding schemes suffer from the oracle problem. Schemes utilizing the transformability of digital signatures were proposed to ensure the correctness of the requests...
A new concept called multi-proxy multi-signcryption is introduced in this paper. In a multi-proxy multi-signcryption scheme, a group of original signcrypters can authorize a group of proxy signcrypters under the agreement of all signcrypters in the original group. Then only the cooperation of all signcrypters in the proxy group could generate a multi-proxy multi-signcryption. We propose a multi-proxy...
In order to solve the problem of trust in C2C e-commerce better, a history and future information based trust model is proposed in this paper. In this model the historical evaluation and future information are all considered. Thus, the entitiespsila historical behaviors are reflected in the trust value, and the starvation effect is prevented effectively. Based on the research achievements of trust...
Blind signature is very important technology in secure e-commerce. Certificateless public key cryptography avoids the using of certificate in certificate-based public key signature scheme and removes key escrow in ID-based signature scheme. In this paper we introduce the notion of blind signature into certificateless public key cryptography and propose a concrete certificateless blind signature scheme...
A blind signature is a very important technology in e-commerce. This paper uses an ideal cipher with a smaller block size to design a secure two-move blind signature with an optimal padding. Our new scheme has the message recovery property with less bandwidth, which means the user can recover the message from the signature signed by the signer, but costs no other bandwidth to save power and battery...
In order to solve the data integrity, non-repudiation, confidentiality and operation inefficiency of the mobile e-commerce, in this paper, mobile e-commerce security model is established. The design is based on mobile e-commerce architecture, analyzing the digital signature authentication process and data security transmission procedure in the system. Delamination modularized software design method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.