Để hoàn thiện và nâng cao độ an toàn của mô hình đề xuất, đồ án có thể phát triển theo các sau:
- Nâng cao độ lớn cặp khóa dùng trong RSA lên 2048 bits. - Tìm hiểu và cài đặt chữ ký kép.
- Cải thiện giao diện người dùng.
TÀI LIỆU THAM KHẢO
[1] TS. Nguyễn Đăng Hậu (2004), “Kiến thức Thương mại điện tử”, Viện Đào tạo Công nghệ và Quản lý Quốc tế.
[2] TS. Nguyễn Văn Minh, Trần Hoài Nam (2002), “Giao dịch Thương mại điện tử - Một số vấn đề cơ bản”, NXB Chính Trị Quốc Gia [3] Dale Barr (2004), “Public Key Infrastructure”,
http://www.ncs.gov/library/tech_notes/tn_vol11n3.pdf
[4] Jemery Bradley, Neil Davies (1995), “Analysis of the SSL Protocol”, Department of Computer Science, University of Bristol
[5] Jean Carlo Binder (2002), “Introduction to PKI – Public Key
Infrastructure”, Technologies du multimedia, des telecommunications et de l’Internet
[6] Jim Cowing (1998), “Introduction to Digital Certificates”, WICS- Stanford University.
[7] Joan Daemen, Vincent Rijmen (1999), “AES Proposal: Rijndael”, http://www.cs.bilkent.edu.tr/~selcuk/teaching/cs519/rijndael.pdf [8] Frederick J. Hirsen, “An Introduction to SSL/TLS and Certificates”,
http://home.comcast.net/~fjhirsch/SSL/tlstut.ppt
[9] Michael Fisher (2002), “Generalized Payment Model for Internet Services”, Distributed System Group Technical University of Vienna. [10] William Mehuron (1999),“Data Encryption Standard (DES)”, U.S
Department of Commerce/National Institue of Standards and Technology.
[11] A. Menezes, P. van Oorschot, and S. Vanstone (1996), “Handbook of Applied Cryptography”, CRC-Press; 1st edition
[12] Dr. Nada, M.A. Al-Slamy (2008), “E-Commerce security”, Alzaytoonah University MIS Dept. Amman, Jordan 962, IJCSNS
International Journal of Computer Science and Network Security, VOL 8 No 5
[13] R.L.Rivest, A.Shamir, and L.Adleman, “A Method for Obtaining Digital
http://people.csail.mit.edu/rivest/Rsapaper.pdf
[14] A Sengupta, C Mazumdar and M S Barik (2005), “e-Commerce security – A life cycle approach”,
http://www.springerlink.com/index/A1176467775M153Q.pdf [15] David Wagner, Bruce Schneier (1997), “Analysis of the SSL 3.0
protocol”.
http://www.schneier.com/paper-ssl-revised.pdf
[16] Joel Weise (2001), “Public Key Infrastructure Overview”, Sun PSSM Global Security Practice, Sun BluePrintsTM Online
[17] Andrew B. Whinston, Dale O. Stahl, Soon-Yong Choi (2003), “The economics of Electronic Commerce”, Mac Millan Publishing Company [18] “Digital Certificate Infrastructure”, Digital Library Federation (DLF)
and
the Corporation for Research and Educational Networking (CREN), http://www.diglib.org/architectures/cren-dlf.pdf
[19] “RFC 2559 - Internet X.509 Public Key Infrastructure Operational Protocols”, http://www.ietf.org/rfc/rfc2559.txt
[20] “Specification for the Advanced Encryption Standard (AES)”, Federal Information Processing Standards Publication 197, 2001.