参考文献/References:
[1] Terence Spies. Public Key Infrastructure [M]// Vacca J R. Computer and Information Security Handbook. San Francisco: Morgan Kaufmann, 2009: 433-451.
[2] Hartini Saripan, Zaiton Hamin. The application of the digital signature law in securing internet banking: Some preliminary evidence from Malaysia [J]. Procedia Computer Science, 2011, 3: 248-253.
[3] ITU-T X.509. Information Technology-Open Systems Interconnection-The Directory: Public-Key and Attribute Certificate Frameworks[M].[s.l.]: ITU-T Recommendation X.509, 2000.
[4] BarbaraMiller.Electronicgovernment,concepts,methodologies, tools, and applications[J]. Government Information Quarterly, 2010, 27(1): 109-110.
[5] TaekyoungKwon. PrivacypreservationwithX.509standard certificates[J]. Information Sciences, 2011, 181(13): 2906-2921.
[6] “Chinese commercial password authentication architecture research” task group. Digital Certificate Application Guide[M]. Beijing: Publishing House of Electronics Industry, 2008.(in Chinese)
《中国商用密码认证体系结构研究》课题组. 数字证书应用技术指南[M]. 北京:电子工业出版社, 2008.
[7] GB/T 20518-2006. Information security technology- public key infrastructure PKI digital certificate format[S]. (in Chinese)
GB/T 20518-2006. 信息安全技术 公钥基础设施 数字证书格式[S].
[8] YANG Yi-xian, NIU Xin-xin. Applied Cryptography[M]. Beijing: Publishing House of Beijing University of Post & Telecommunication, 2005.(in Chinese)
杨义先, 钮心忻. 应用密码学[M]. 北京: 北京邮电大学出版社, 2005.
[9] LD/T 30-2009. Human resources and social security of electronic authentication system[S].(in Chinese)
LD/T 30-2009. 人力资源和社会保障电子认证体系[S].
[10] BAO Zhong-ping. Standard System: Principles and Practice[M]. Beijing: Standards Press of China, 1998.(in Chinese)
鲍仲平. 标准体系的原理和实践[M]. 北京: 中国标准出版社, 1998.
相似文献/References:
[1]张席,陈泯融,刘浩.无需随机预言模型的基于身份门限解密方案[J].深圳大学学报理工版,2010,27(3):340.
ZHANG Xi,CHEN Min-rong,and LIU Hao.Practical identity-based threshold decryption scheme without random oracle[J].Journal of Shenzhen University Science and Engineering,2010,27(No.2(095-188)):340.
[2]张席,陈泯融,杨玲.基于身份多接收者签密方案的安全性分析[J].深圳大学学报理工版,2010,27(4):408.
ZHANG Xi,CHEN Min-rong,and YANG Ling.Cryptanalysis of an identity-based multi-recipient signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2010,27(No.2(095-188)):408.
[3]张席,刘浩.安全签密方案在嵌入式设备中的应用[J].深圳大学学报理工版,2011,28(No.5(377-470)):417.
ZHANG Xi and LIU Hao.The application in embedded device of a security signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2011,28(No.2(095-188)):417.
[4]张鹏,喻建平,刘宏伟.同态签密方案及其在电子投票中的应用[J].深圳大学学报理工版,2011,28(No.6(471-564)):489.
ZHANG Peng,YU Jian-ping,and LIU Hong-wei.A homomorphic signcryption scheme and its application in electronic voting[J].Journal of Shenzhen University Science and Engineering,2011,28(No.2(095-188)):489.
[5]欧阳春娟,李霞,李斌.基于递进多目标蛙跳优化的LSB±K隐写算法[J].深圳大学学报理工版,2012,29(No.3(189-282)):224.[doi:10.3724/SP.J.1249.2012.03224]
OUYANG Chun-juan,LI Xia,and LI Bin.A secure LSB plus-minus K steganography based on escalating multi-objective SFLA[J].Journal of Shenzhen University Science and Engineering,2012,29(No.2(095-188)):224.[doi:10.3724/SP.J.1249.2012.03224]
[6]李雄伟,张鹏,陈开颜,等.微控制器密码芯片秩相关电磁分析[J].深圳大学学报理工版,2012,29(No.3(189-282)):230.[doi:10.3724/SP.J.1249.2012.03230]
LI Xiong-wei,ZHANG Peng,CHEN Kai-yan,et al.Rank correlation electromagnetic analysis on microcontroller[J].Journal of Shenzhen University Science and Engineering,2012,29(No.2(095-188)):230.[doi:10.3724/SP.J.1249.2012.03230]