Publisher
Springer Berlin Heidelberg
Reference8 articles.
1. Zhang, Y., Deng, X., Li, Y., et al.: E-commerce security assessment under group decision making. Journal of Information and Computational Science 8(1), 7–15 (2011)
2. Wu, Y.: E-commerce security based on a security engineering life cycle. Advanced Materials Research 171-172, 640–643 (2011)
3. Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn., pp. 549–559 (2007)
4. Wang, G.: An abuse-free fair contract-signing protocol based on the RSA signature. IEEE Transactions on Information Forensics and Security 5(1), 158–168 (2010)
5. Lecture Notes in Computer Science;S. Schäge,2010
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data;International Journal of Foundations of Computer Science;2017-09
2. A simple authentication encryption scheme;Concurrency and Computation: Practice and Experience;2017-02-02
3. A Blockcipher Based Authentication Encryption;Lecture Notes in Computer Science;2016