Relationship of the properties in the e-business security

被引:0
|
作者
Shen Yan-guang [1 ]
Si Chun-jing [1 ]
机构
[1] Hebei Univ Engn, Baoding 056038, Peoples R China
关键词
spectrum theory; propagation criterion; balancedness; correlation immune; nonlinearity;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
This paper researched the relationship of the properties of Boolean functions between the balancedness and others, because the significance of the cryptography functions for electronic business. The research is based on the main properties of Boolean functions. And the cycle Walsh spectrum theory is used in the study. Finally the results that the existence of balanced Boolean functions satisfying correlation immune of order in, or satisfying propagation criterion of certain degree under some conditions are aiven. Using these results, the safer Boolean functions, which have balancedness and other properties can be constructed.
引用
收藏
页码:1128 / 1131
页数:4
相关论文
共 50 条
  • [1] The Security, Privacy, and Solutions of E-Business
    Huang, Hao
    Ma, Yuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MANAGEMENT AND ENGINEERING (CME 2014), 2014, : 441 - 446
  • [2] E-business security: Methodological considerations
    Informatics Research Group, Sheffield Hallam University, Howard Street, S1 1WB, Sheffield, United Kingdom
    World Acad. Sci. Eng. Technol., 2009, (624-631):
  • [3] Algorithm aids e-business security
    不详
    IEEE MICRO, 2001, 21 (01) : 7 - 7
  • [4] Security Design for E-Business Applications
    Vasilyevna, Nadejda Belbus
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 248 - 251
  • [5] Security requirements of E-business processes
    Knorr, K
    Röhrig, S
    TOWARDS THE E-SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2001, 74 : 73 - 86
  • [6] E-business security in international perspective
    Karmakar, NL
    HUMAN PERSPECTIVES IN THE INTERNET SOCIETY: CULTURE, PSYCHOLOGY AND GENDER, 2004, 4 : 523 - 534
  • [7] Authentication and transaction security in E-business
    Mueller, Lorenz
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2008, : 175 - 197
  • [8] Modelling e-business security using business processes
    Nachtigal, S.
    Mitchell, C. J.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 459 - +
  • [9] E-business in dyadic relationship perspective
    Santema, Sicco
    TOOLS AND METHODS OF COMPETITIVE ENGINEERING VOLS 1 AND 2, 2004, : 977 - 986
  • [10] The security policy of e-business based on PKI
    Zhang, CY
    Zhang, LQ
    THIRD INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE ENGINEERING: DIGITAL ENTERPRISES AND NONTRADITIONAL INDUSTRIALIZATION, 2003, : 655 - 659