期刊文献+

WAP中的安全构架模型研究 被引量:1

Research of security structure Based on WAP
下载PDF
导出
摘要 文章介绍了WAP的基本概念、网络模型及信息传输中的安全性需要,讨论了为实现安全性对WAP应用架构模型提出的要求,分析了架构模型的组成部分,最终使基于WAP安全架构模型的应用系统,能保证传输过程中数据的保密性、完整性、不可否认性,并完成通信双方的身份认证。 This paper introduces the basic concept of WAP, network model and safety demands in the data transport process. Discusses the requirements of application model to realize the safety with WAP's application frame. Analyzes the components of the frame construct model. At last realizes the application system based on WAP's safety frame which guarantees the data transmission secretly and integrallty, and also guarantees to identify authentication and not deny between communication both sides.
作者 吴冬梅
出处 《电力系统通信》 2004年第6期50-52,共3页 Telecommunications for Electric Power System
关键词 无线应用协议 信息安全 认证 Wireless Application Protocol information-Security dentify authentication
  • 相关文献

参考文献4

二级参考文献11

  • 1[1]WAP WTLS Version 05-Nov-1999, Wireless Application Protocol, Wireless Transport Layer Security Specification[EB/OL]. http://www.wapforum.org,1999-09-26.
  • 2[2]Saarinen, Markku-Juhani. Attacks Against the Wap Wtls Protocol[EB/OL]. http://www.docshow.net/wap/wtls.zip,1999-09-20.
  • 3[3]Sami Jormalainen, Jouni Laine. Security in the WTLS[A]. The HUT Network Security Seminar in the Fall of 1999 Focused on Security in Electronic Trans[C]. 2000.
  • 4[4]Nokia Group. Deployment Scenarios for Corporate WAP Services[EB/OL]. http://www.forum.nokia.com/download/whitepaper_deploy_scenarios.pdf, 1999-11-12.
  • 5[1]TRASK N T, JAEEED S A. Adapting public key infrastructures to the mobile environment [J]. BT Technol J, 2001,19 (3): 76 ~ 79.http ://www. soi. city. ac. uk/~ kam/trask. pdf
  • 6[2]Certicom Corporation 2000. Complete WAP Security [Z]. http ://www. certicom. com/resources/download/WAP. pdf
  • 7[3]Certicom Corporation 2001. Wireless Public-Key Infrastructure [Z].http ://www. certicom. com/resources/download/WAP. pdf
  • 8[4]Sami Jormalainen, Jouni Laine. Security in the WTLS [D]. Computer Science and Engineering Helsinki University of Technology.10.1. 2000. http ://www. hut. fi/ ~ jtlaine2/wtls/
  • 9Wireless Application Protocol:Wireless Transport Layer Security Spe-cification[S].
  • 10Bruce Schneier. Applied Cryptography Second Edition-Protocols,algo-rithms,and source code in C[S].ISBN 7-111-07588-9

共引文献10

同被引文献7

  • 1袁志锋,刘广东,朱琦.基于WTLS的WAP安全实现研究[J].信息技术,2004,28(12):62-64. 被引量:5
  • 2王建兵.PKI数字证书在WEB系统中的安全应用[J].国土资源信息化,2005(1):40-44. 被引量:6
  • 3马建锋,等.无线局域网安全-方法与技术[M].北京:机械工业出版社,2005.
  • 4WirelessApplicationProtocolForum,Ltd.WAP无线应用协议[M].北京:机械工业出版社,2000.
  • 5Wireless Application Protocol Forum, Ltd. Wireless identity module specification [ EB/OL]. 2006. http ://technical. open- mobilealliance, org/Technical/wapindex, aspx.
  • 6Davies J. Implementing SSL/TLS using cryptography and PKI [ M ]. USA : Wiley ,2011.
  • 7Sun Hung- Min. Cryptanalysis of Aydosetal' s ECC- based wireless authentication protocol [ C ]//Proceedings of the 2004 IEEE international conference on e-technology, e-commerce and e-commerce and e-service. [ s. 1. ] : IEEE Computer So- ciety ,2004.

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部