{"title":"选择合适的哈希函数进行保险公司电子标书信息认证","authors":"Ava Pourkashani, R. Rzayev, F. Faghihi","doi":"10.1109/ICCIT.2010.5711224","DOIUrl":null,"url":null,"abstract":"Nowadays, expansion of insurance companies provides competitive market, in which several companies participate in tenders with huge price. as a lot of tenders are held based on electronic form, tender documents security is taken into consideration as high level technical issue. In this paper, decision making algorithm based on AHP for suitable authentication function in e-tender of insurance companies is proposed. For this reason, three kinds of applied hash functions (CBC-MAC, SHA-1 and HMAC) are evaluated based on throughput, security and universality criteria.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Appropriate hash functions selection for message authentication in electronic tender for insurance companies\",\"authors\":\"Ava Pourkashani, R. Rzayev, F. Faghihi\",\"doi\":\"10.1109/ICCIT.2010.5711224\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, expansion of insurance companies provides competitive market, in which several companies participate in tenders with huge price. as a lot of tenders are held based on electronic form, tender documents security is taken into consideration as high level technical issue. In this paper, decision making algorithm based on AHP for suitable authentication function in e-tender of insurance companies is proposed. For this reason, three kinds of applied hash functions (CBC-MAC, SHA-1 and HMAC) are evaluated based on throughput, security and universality criteria.\",\"PeriodicalId\":131337,\"journal\":{\"name\":\"5th International Conference on Computer Sciences and Convergence Information Technology\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"5th International Conference on Computer Sciences and Convergence Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIT.2010.5711224\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"5th International Conference on Computer Sciences and Convergence Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIT.2010.5711224","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Appropriate hash functions selection for message authentication in electronic tender for insurance companies
Nowadays, expansion of insurance companies provides competitive market, in which several companies participate in tenders with huge price. as a lot of tenders are held based on electronic form, tender documents security is taken into consideration as high level technical issue. In this paper, decision making algorithm based on AHP for suitable authentication function in e-tender of insurance companies is proposed. For this reason, three kinds of applied hash functions (CBC-MAC, SHA-1 and HMAC) are evaluated based on throughput, security and universality criteria.