[1] |
魏伶俐, 张淑霞, 晏杰 ,等. 国际电子签名立法状况介绍[C]// 信息社会档案学理论与实践. 2006:8.
|
|
WEI L L , ZHANG S X , YAN J ,et al. Introduction to legislation of international electronic signature[C]// Theory and Practice of Archival Science in Information Society. 2006:8.
|
[2] |
国际电子商务立法[J]. 国际化工信息, 2005,(7): 47.
|
|
International electronic commerce legislation[J]. Global Chemical Information, 2005,(7): 47.
|
[3] |
PEARCE G , PLATTEN N . Promoting the information society :The EU directive on electronic commerce[J]. European Law Journal, 2000,6: 363-378.
|
[4] |
国际电子商务立法[J]. 信息安全与通信保密, 2001,1: 36-37.
|
|
Measures for the administration of Internet Information Services[J]. China Information Security, 2001,1: 36-37.
|
[5] |
GB T 35287-2017. 信息安全技术网站可信标识技术指南[Z].
|
|
GB T 35287-2017. Information security technology-Guidelines of trusted identity technology for website[Z].
|
[6] |
魏宗秀 . 基于 X.509 身份认证协议的研究[J]. 信息安全与通信保密, 2008,11: 54-57.
|
|
WEI Z X . A research based on X.509 authentication and its usage[J]. Information Security and Communications Privacy, 2008,11: 54-57.
|
[7] |
余秦勇 . X.509 V3证书格式及语义[J]. 通信技术, 2001,6: 20-23.
|
|
YU Q Y . The form and semantic description of X.509 V3 certificate[J]. Communications Technology, 2001,6: 20-23.
|
[8] |
杨萍 . Kerberos 的安全性分析及其认证模式的研究与改进[D]. 天津:天津理工大学, 2015.
|
|
YANG P . Security analysis of Kerberos and research and improvement on the authentication scheme[D]. Tianjin:Tianjin University of Technology, 2015.
|
[9] |
KUMAR D , WANG Z , HYDER M ,et al. Tracking certificate misissuance in the wild[C]// IEEE Symposium on Security and Privacy. 2018: 785-798.
|
[10] |
张婕, 王伟, 马迪 ,等. 数字证书透明性 CT 机制安全威胁研究[J]. 计算机系统应用, 2018,27(10): 232-239.
|
|
ZHANG J , WANG W , MA D ,et al. Overview on security issues of certificate transparency[J]. Computer Systems & Applications, 2018,27(10): 232-239.
|
[11] |
LI B , LIN J , LI F ,et al. Certificate transparency in the wild:Exploring the reliability of monitors[C]// ACM SIGSAC Conference on Computer and Communications Security. 2019: 2505-2520.
|
[12] |
吴涛 . 基于PKI技术的CA系统研究及其数字证书管理的实现[D]. 武汉:武汉理工大学, 2004.
|
|
WU T . The research on CA system based on PKI technology and the implementation of management of digital certificat[D]. Wuhan:Wuhan University of Technology, 2004.
|
[13] |
钱思杰, 陈立全, 王诗卉 . 基于改进PBFT算法的PKI跨域认证方案[J]. 网络与信息安全学报, 2020,6(4): 37-44.
|
|
QIAN S J , CHEN L Q , WANG S H . PKI cross-domain authentication scheme based on advanced PBFT algorithm[J]. Chinese Journal of Network and Information Security, 2020,6(4): 37-44.
|
[14] |
LU Z , LIU W , WANG Q ,et al. A privacy-preserving trust model based on blockchain for VANETs[J]. IEEE Access, 2018,6: 45655-45664.
|
[15] |
FU P , LI Z , XIONG G ,et al. [C]// SSL/TLS security exploration through X.509 certificate’s life cycle measurement. 2018: 652-655.
|
[16] |
LINN J . Trust models and management in public-key infrastructures[J]. RSA laboratories, 2000,12.
|
[17] |
彭华熹 . 一种基于身份的多信任域认证模型[J]. 计算机学报, 2006,29(8): 1271-1281.
|
|
PENG H X . An identity-based authentication model for multi-domain[J]. Chinese Journal of Computers, 2006,29(8): 1271-1281.
|
[18] |
杨宇, 谭平嶂, 李镭 ,等. 基于标识的跨域认证系统研究[J]. 信息安全与通信保密, 2009,8: 193-195.
|
|
YANG Y , TAN P Z , LI L ,et al. Identity-based authentication system in multi trust domain[J]. Information Security and Communications Privacy, 2009,8: 193-195.
|
[19] |
WU L , WANG J , CHOO K K R ,et al. An efficient provably- secure identity-based authentication scheme using bilinear pairings for Ad hoc network[J]. Information Security Technical Report, 2017,37: 112-121.
|
[20] |
林俊燕, 张兆雷, 袁智伟 . 物联网中基于IBC的认证加密机制研究[J]. 信息安全与通信保密, 2020,8: 95-101.
|
|
LIN J , ZHANG Z , YUAN Z . Research on authentication encryption mechanism based on IBC in internet of things[J]. Information Security and Communications Privacy, 2020,8: 95-101.
|
[21] |
许盛伟, 郭春锐, 李新玉 . 基于多方共管的IBC改进密钥管理方案[J]. 计算机应用与软件, 2020,37(8): 314-317.
|
|
XU S W , GUO C R , LI X Y . IBC improved key management scheme based on multi-party co-management[J]. Computer Application and Software, 2020,37(8): 314-317.
|
[22] |
黄仁季, 吴晓平, 李洪成 . 基于身份标识加密的身份认证方案[J]. 网络与信息安全学报, 2016,2(6): 32-37.
|
|
HUANG R J , WU X P , LI H C . Identity authentication scheme based on identity-based encryption[J]. Chinese Journal of Network and Information Security, 2016,2(6): 32-37.
|
[23] |
SAATY R . The analytic hierarchy process-what it is and how it is used[J]. Mathematical Modelling, 1987,9(3): 161-176.
|
[24] |
RFC 2986. PKCS#10 :Certificate request syntax specification version 1.7[S]. 2000.
|