期刊文献+

移动网络中瞬时认证技术的设计 被引量:1

Programming of Transient Authentication for Mobile Devices
下载PDF
导出
摘要 移动网络的认证过程对信息和设备的安全起到关键性的作用.首先介绍了移动认证的常用技术,重点探讨了瞬时认证的设计和令牌认证的设计,最后给出一个瞬时认证的应用模型. Authentication for mobile networks is a key role in the security of information and devices. This paper presents the common techniques of mobile authentication firstly, and then analyses programming of transient authentication and token authentication mainly. In the end,a model of transient authentication and its application are introducod.
作者 肖伟
出处 《吉首大学学报(自然科学版)》 CAS 2006年第1期47-50,58,共5页 Journal of Jishou University(Natural Sciences Edition)
基金 国防科技重点实验室基金资助项目(51484040504KG0101)
关键词 移动设备 瞬时认证 安全 mobile device transient authentication security
  • 相关文献

参考文献5

二级参考文献14

  • 1[1]Marie-Pierre Gervais,Alioune Diagne.Enhancing telecommunications service engineering with mobile agent technology and formal methods[J].IEEE Commun Mag,1998,38-43.
  • 2[2]Vu Anh Pham,Ahmed Karmouch.Mobile software agents:an overview[J ].IEEE Commun Mag,1998,26-37.
  • 3[3]LARS Hagen,Markus Breugst,Thomas Magedanz.Impacts of mobile agent technology on mobile communication system evolution[J].IEEE Personal Commun Mag,1998,56-69.
  • 4[4]RFC1510.1993,The Kerberos Network Authentication Service[S].
  • 5[5]FIAT A,SHAMIR A.How to prove yourself:practical solutions to identification and signature roblems[J].Proc CRYPTO '86,Lecture Notes in Computer Science,Spring Verlag,1985,186-194.
  • 6[6]Shafi Goldwasser,Silvio Micali,Rackoff C.The knowledge complexity of interactive proof systems[A].17th STOC[C].1985.
  • 7Wong DS, Chan AH. Mutual authentication and key exchange for low power wireless communications. In: Edmonds A, Yenser G,Ferrari G, eds. Proceedings of the IEEE MILCOM 2001 Conference. Washington DC: IEEE Communication Society, 2001.39,43.
  • 8Jakobsson M, Pointcheval D. Mutual authentication for low-power mobile devices. In: Syverson PF, ed. Proceedings of the Financial Cryptography 2001. Heidelberg: Springer-Verlag, 2001. 178-195.
  • 9Bellare M, Rogaway P. Entity authentication and key distribution. In: Stinson DR, ed. Proceedings of the CRYPTO'93. Lecture Notes in Computer Science Vol.773, Heidelberg: Springer-Verlag, 1994. 232-249.
  • 10Bellare M, Rogaway P. Provably secure session key distribution--the three party case. In: Leighton FT, Borodin A, eds.Proceedings of the 27th ACM Symposium on Theory of Computing. Las Vegas: ACM, 1995.57-66.

共引文献18

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部