好开玩笑 发表于 2025-3-25 06:33:16

gies to facilitate the design and evolution of electronic commerce systems. Risk and impact assessment is critical for ensuring that system requirements are aligned with an enterprise—s security policy and privacy policy. Consequently, we tailor our goal-based approach by including a compliance acti

委屈 发表于 2025-3-25 11:05:48

ause each notion of “approximate equality”introduces its own set of difficulties; using encryption is more problem-atic in this framework because the items that are approximately equal cease to be so after encryption or cryptographic hashing. Practical pro-tocols for solving such problems make possi

Lacunar-Stroke 发表于 2025-3-25 14:48:32

http://reply.papertrans.cn/31/3001/300053/300053_23.png

ineptitude 发表于 2025-3-25 17:57:45

http://reply.papertrans.cn/31/3001/300053/300053_24.png

有节制 发表于 2025-3-25 20:44:50

http://reply.papertrans.cn/31/3001/300053/300053_25.png

LOPE 发表于 2025-3-26 00:30:57

http://reply.papertrans.cn/31/3001/300053/300053_26.png

摸索 发表于 2025-3-26 06:32:43

http://reply.papertrans.cn/31/3001/300053/300053_27.png

amnesia 发表于 2025-3-26 09:13:47

http://reply.papertrans.cn/31/3001/300053/300053_28.png

Derogate 发表于 2025-3-26 15:31:01

http://reply.papertrans.cn/31/3001/300053/300053_29.png

抚育 发表于 2025-3-26 16:47:14

is just another modal operator in a generic belief logic. We then describe our belief logic and present an axiomatization system for analyzing cryptographic protocols for e-commerce. Finally, we illustrate with two examples how our logic can be used for our intended purpose.
页: 1 2 [3] 4
查看完整版本: Titlebook: E-Commerce Security and Privacy; Anup K. Ghosh Book 2001 Kluwer Academic Publishers 2001 E-Commerce.Electronic Commerce.Internet.Text.comp