Relationship of the properties in the e-business security

被引:0
|
作者
Shen Yan-guang [1 ]
Si Chun-jing [1 ]
机构
[1] Hebei Univ Engn, Baoding 056038, Peoples R China
关键词
spectrum theory; propagation criterion; balancedness; correlation immune; nonlinearity;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
This paper researched the relationship of the properties of Boolean functions between the balancedness and others, because the significance of the cryptography functions for electronic business. The research is based on the main properties of Boolean functions. And the cycle Walsh spectrum theory is used in the study. Finally the results that the existence of balanced Boolean functions satisfying correlation immune of order in, or satisfying propagation criterion of certain degree under some conditions are aiven. Using these results, the safer Boolean functions, which have balancedness and other properties can be constructed.
引用
收藏
页码:1128 / 1131
页数:4
相关论文
共 50 条
  • [21] Customer relationship management in an E-business environment
    Anderson, W
    IEMC'01: CHANGE MANAGEMENT AND THE NEW INDUSTRIAL REVOLUTION, PROCEEDINGS, 2001, : 311 - 316
  • [22] The Evolution of ERP and Its Relationship with E-Business
    Alwabel, S.
    Zairi, M.
    Gunasekaran, A.
    INTERNATIONAL JOURNAL OF ENTERPRISE INFORMATION SYSTEMS, 2006, 2 (04) : 58 - 76
  • [23] A security architecture for E-business based on grid technology
    Zhou, Ning
    Zhang, Fangfang
    Yu, Xiaosheng
    FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1352 - 1356
  • [24] Directions for security and privacy for Semantic E-business applications
    Thuraisingham, B
    COMMUNICATIONS OF THE ACM, 2005, 48 (12) : 71 - 73
  • [25] Public Key Infrastructure: managing the e-Business security
    Lai, XJ
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 505 - 505
  • [26] A METHOD TO ENSURE DATA SECURITY IN E-BUSINESS CLOUD
    Gong, Jingyi
    Han, Kaifeng
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 422 - 425
  • [27] If e-business is different, then so is research in e-business
    Clarke, R
    SEEKING SUCCESS IN E-BUSINESS: A MULTIDISCIPLINARY APPROACH, 2003, 123 : 3 - 19
  • [28] E-business security design using process security requirements septet
    Nachtigal, S.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 408 - 413
  • [29] Accountancy for E-Business Enterprises Based on Cyber Security
    Yang, Yu
    Yin, Zecheng
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2023, 19 (06)
  • [30] E-business Workflow Security Architecture based on UCON
    Wen, Haoyu
    Ji, Dongxing
    2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 338 - 340