共查询到19条相似文献,搜索用时 95 毫秒
1.
2.
介绍了椭圆曲线密码体制的基本应用,分析了ECC优于其他公钥系统的具体优点及其数学原理。针对椭圆曲线的研究热点,归纳出椭圆曲线选取原则以及椭圆曲线快速算法的基本原理。深入研究了椭圆曲线上双线性映射,构建了其在电子商务中应用模型,证明了该性质对ECC进一步发展的促进作用。 相似文献
3.
移动商务的身份认证问题已成为制约移动商务发展的瓶颈.动态口令技术实现简单、成本低、无须第三方认证的特点使其较适合移动商务的身份认证.基于动态口令的认证思想,引入椭圆曲线密码体制进行改进,提出一套移动商务身份认证机制,最后分析了该机制的安全性. 相似文献
4.
移动商务的身份认证问题已成为制约移动商务发展的瓶颈。动态口令技术实现简单、成本低、无须第三方认证的特点使其较适合移动商务的身份认证。基于动态口令的认证思想,引入椭圆曲线密码体制进行改进,提出一套移动商务身份认证机制,最后分析了该机制的安全性。 相似文献
5.
6.
7.
朱彩飞 《中小企业管理与科技》2012,(27)
近年来,由于电子商务技术的广泛应用和推广,给不少企业带来了便利的条件和创造了无限商机.但是随着因特网的共享和开放直接影响了电子商务的信息安全.本文介绍了电子商务可可以采用数字签名、数字证书和加密技术等技术和SET协议、SSL协议提高电子商务信息的安全系数,并对其今后的发展提供了自己的看法. 相似文献
8.
一.电子商务支付系统的结构选择 根据采用的支付安全协议,目前电子商务的支付体系结构主要有两种,一种是SET结构,另一种是非SET结构.国内网上支付普遍采用的是非SET结构网上支付方法. 相似文献
9.
10.
文章对基于SET协议的电子商务系统中的身份认证进行了研究,将SET规范与RSA算法以及第三方证书认证相结合,提出了一种SET在线支付体系中对交易各方进行身份认证的方案,为电子商务的信息安全、支付安全的解决方案提供了充分的依据。 相似文献
11.
SET协议是电子支付安全领域的一个重要工业标准,通过对SET协议的工作流程进行分析,指出了SET协议在商品原子性和确认发送原子性方面的缺陷,针对该缺陷给出了一种由支付网关充当可信第三方的改进的SET协议原子性方案。 相似文献
12.
学生评教主要有帮助学生参与到教学设计和帮助学校监督管理教学质量这两点作用,学生评教结果对评价教师的工作和学校的管理教学有很重要的影响。但存在着不包括在评教内容之内,但却会对评教结果产生较大影响的因素,本文将这些因素定义为学生评教系统外因素,这些因素会影响学生评教结果的真实性与客观性,从而使学生评教机制无法正确发挥功能。本文分析了6种系统外因素的机理,并针对这6种因素都提出了4种控制方法,为今后的研究奠定基础。 相似文献
13.
Clair Brown Michael Reich David Stern 《International Journal of Human Resource Management》2013,24(2):247-275
The emerging employment system characterized by a high degree of employment security with flexible job assignments, employee involvement in problem solving and continuous improvement, and continuous training of employees is discussed. This model is called the SET system (for Security, Employee involvement and Training) and it is examined by means of case studies of five US firms that are attempting to establish or maintain a SET system. It is found that SET systems are difficult to implement in a gradual and partial manner. The three elements of SET reinforce one another and firms that are successful in adopting SET have made an investment to implement all three SET elements simultaneously. Four factors that impede implementation of a SET system are then identified. 相似文献
14.
在线安全支付是保证电子商务发展的关键环节。本文在分析目前主要使用的两种安全支付协议各自原理的基础上,对二者进行了详细的比较,并指出SET是未来的发展方向。 相似文献
15.
Ming-Tien Tsai Hsiu-Ching Chang Nai-Chang Cheng Chung-Chang Lien 《Quality and Quantity》2013,47(5):2739-2753
Knowledge sharing is the behavior of disseminating acquired knowledge to other members of an organization, and often presents major challenges, because some employees resist sharing their knowledge with others. In this paper, we investigate the knowledge sharing behavioral intention based on social exchange theory (SET). SET emphasizes non-material exchange, and people share their knowledge by weighing the potential benefits and risks of social relationships. The research presented in this study includes various constructs based on SET and social cognitive theory. This study examines the role of social exchange factors (perceived organizational support, organizational trust and reciprocal relationship expectancy) in explaining IT professionals’ knowledge sharing intentions through KMS. Based on a survey of 251 IT professionals in STSP, this study applies structural equation modeling to verify the research model. The results showed that trust, self-efficacy and reciprocal relationship expectancy are significantly associated with knowledge sharing through KMS. 相似文献
16.
17.
本文结合企业培训及高职教育领域在职业技能培育方面的实践体验与思考,提出了以职业技能为导向的情境体验培训模式(VSC-SET模式)的基本内涵、框架体系、设计与实施,力图构建一个具有普遍适用意义的职业技能培育范式。 相似文献
18.
19.
Mónica Martínez-Gómez Jose Miguel Carot Sierra José Jabaloyes Manuel Zarzo 《Quality and Quantity》2011,45(6):1415-1427
Student evaluation of teaching (SET) questionnaires are the most common methods of evaluation used by European universities
to assess the quality of teaching delivered by their lecturers. A series of multivariate statistical methods were applied
to analyze the underlying structure of the SET questionnaire used by the Universidad Politecnica de Valencia (UPV) in order
to develop an appropriate methodology for extracting, analyzing, and interpreting the information contained in the questionnaire.
In a first step, a confirmatory factorial analysis (CFA) was developed in order to evaluate the reliability, validity and
dimensionality of it, by means of two relatively new parameters commonly used in structural equation modelling: the compound
reliability and extracted variance for each latent construct. In a second step, cluster analysis (CA) was used to test the
ability of the questionnaire for the identification of different categories of lecturers. In the last step, a tree classification
method, the chi-squared automatic interaction detector (CHAID), was used in order to characterize the different lecturer’s
categories obtained with CA according to all available information regarding the teaching staff and subjects. 相似文献