期刊文献+

Trust Authentication Protocol on the Web

Trust Authentication Protocol on the Web
下载PDF
导出
摘要 It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other, Trust relationship must be established between strangers before authentication, To achieve trust authentica tion, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web. It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other, Trust relationship must be established between strangers before authentication, To achieve trust authentica tion, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.
出处 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期253-255,共3页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Funda-tion of China (60403027) Natural Science Fundation Of Hubei Prov-ince of China(2005ABA243)
关键词 TRUST AUTHENTICATION WEB trust authentication Web
  • 相关文献

参考文献2

  • 1Hess A,Holt J,Jacobson J,et al.Content-Triggered Trust Negotiation[].ACM Transactions on Graphics.2004
  • 2Winslett M,Yu T,Seamons K,et al.Trust Negotiation on the Web[].IEEEInternet Computing.2002

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部