期刊文献+

WCDMA系统安全机制研究 被引量:4

Researches on Security Features in WCDMA
原文传递
导出
摘要 研究了3G的安全特征,分析了从3GPP R99到R5协议版本中WCDMA系统安全机制的发展,通过分析WCDMA R99信令系统中安全机制的建立过程,重点对WCDMA R99网络中的鉴权和密钥协商机制、身份和数据保密性服务、数据完整性服务等机制进行了深入探讨,并对实现上述各种机制的算法和协议做了详细描述。 The development of security features from WCDMA R99 to R5 are researched. Through analysis on the security set-up procedure in WCDMA R99 signaling system, authentication and key agreement mechanism, confidenfiality of user identity and data, integrality protection are discussed deeply. Also the arithmetic and protocol for realizing them are described in detail.
出处 《通信技术》 2007年第4期51-53,共3页 Communications Technology
基金 国防预研基金资助项目(项目编号:40901010201)
关键词 鉴权和密钥协商 f8加密 f9完整性保护 MAPsec IMS AKA, f8 encryption, f9 integrality protection, MAPsec, IMS
  • 相关文献

参考文献5

  • 13G TS 33.102 V3.1. 0 (1999-07).3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;3G Security;Security Architecture(Release99)
  • 23GPP TS33.105 V4. 1.0 (2001-06) . Technical Specification: Third Generation Partnership Project: Technical Specification Group Services and System Aspects: 36 Security: Cryptographic Algorithm Requirements (Release 4)
  • 33GPP TS33.210 V5.4.0 (2003-06). Technical Specification; Third Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Network Domain Security; IP Network Layer Security (Release 5)
  • 43GPP TS23.228 V5.7.0 (2002-12). Third Generation Partnership Project; Technical Specification Group Services and System Aspects; IP Multimedia Subsystem (IMS): Stage 2 (Release 5)
  • 5Valtteri Niemi ,Kaisa Nyberg. UMTS Security. Nokia Research Center, Finland, 2003

同被引文献26

  • 1张明,黎军,王嘉琪,刘正军.WCDMA 随机接入信道捕捉结构及性能分析[J].无线电工程,2005,35(12):1-4. 被引量:5
  • 2傅海阳,沈晖,陆素花.WCDMA无线接入标准性能分析[J].南京邮电大学学报(自然科学版),2006,26(3):42-48. 被引量:1
  • 3章力,徐颖.3G(WCDMA)架构和网络承载技术[J].辽宁工程技术大学学报(自然科学版),2006,25(3):415-417. 被引量:2
  • 4JOHNSON D,PERKINS C,AREKO J.Mobility Support in IPv6[DB/OL].(2007-01-20)[2009-09-21].http://rfc.sunsite.dk/rfc/rfc 3775.html.
  • 5CHOI K Y,PARK J H,HWANG J Y,et al.Efficient Certificateless Signature Schemes[C] //Katz J.LNCS 4521:ACNS 2007.Berlin:Springer-Verlag,2007:443-458.
  • 6ZHANG L,ZHANG F T,ZHANG F G.New efficient certificateless signature scheme[C] //Denko M.LNCS 4809:EUC Workshops 2007.Berlin:Springer-Verlag,2007:692-703.
  • 7ZHANG L, ZHANG F T, ZHANG F G. New Efficient Certificateless Signature Scheme[C]. Denko M. LNCS 4809: EUC Workshops 2007. Berlin: Springer-Verlag, 2007:692-703.
  • 8ZHANG Z, FENG D. Key Replacement Attack on a Certificateless Signature Scheme (Cryptology ePrint Archive) [DB/OL]. (2006-04 03)[2007-07-20]. http://eprint. iacr. org/2006/453.pdf.
  • 9JOHNSON D, PERKINS C, ARKKO J. Mobility Support in IPv6 [DB/OL], (2006-2-24) [2007-01-20]. http://rfc. sunsite. dk/ rfc/rfc3775. html.
  • 10CHOI K Y, PARK J H, HWANG J Y, et al. Efficient Certificateless Signature Schemes// Katz J. LNCS 4521: ACNS 2007. Berlin:Springer Verlgg, 2007:443-458.

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部