期刊文献+

认证测试与理想分析方法比较

A Comparison Between Authentication Test Method and Ideal Analysis Method
下载PDF
导出
摘要 针对刘霞提出的改进的Server-specific MAKEP协议,利用串空间模型中的理想理论和认证测试理论对其认证性进行分析,包括响应者认证和发起者认证.结果表明,改进的SSM协议能够达到协议的认证性目标.最后对两种分析理论进行分析比较. Using the authentication test and ideal theory of strandspace model, we have analyzed the authentication of Liu Xia's modified version of server-specific MAKEP protocol. And the analysis contains responser's authentication and sponsor's authentication. The result shows that amended SSM protocol can reach the goal of the authentication. At last, we have compared with two analysis methods.
出处 《淮北煤炭师范学院学报(自然科学版)》 2010年第1期34-37,共4页 Journal of Huaibei Coal Industry Teachers College(Natural Science edition)
基金 国家自然科学基金项目(60773121) 安徽省自然科学基金项目(070412052) 代数攻击中布尔函数的应用研究(ZRc2008169)
关键词 串空间模型 认证性 认证测试 理想 strandspace model authentication authentication test ideal
  • 相关文献

参考文献4

  • 1THAYER F J, HERZOG J C, GUTTMAN J D. Strand spaces: Proving security protocols correct[J] .Journal of Computer Security, 1999, 7(2/3): 191 -230.
  • 2刘霞,古天龙.无线认证协议Server-specific MAKEP的一种改进[J].桂林电子工业学院学报,2006,26(4):255-258. 被引量:2
  • 3JAVIER T F, JONATHAN C H, JOSHUA D. Guttman. Authentication tests[C]//Proc, of 2000 IEEE Symposium on Security and Privacy. Oakland CA: IEEE Computer Society Press, 2000: 96-109.
  • 4THAYER F J, HERZOG J C, GUTTMAN J D. Strand spaces: Honest ideals on strand spaces[C]//Proceedings of the 1998 IEEE Computer Security Foundations Workshop. Los Alamitos: 1EEE Computer Society Press, 1998:66-77.

二级参考文献5

  • 1SHIM K,LEE YOUNG-RAN.Security flaws in authentication and key establishment protocols for mobile communications[J].Applied Mathematics and Computation,2005,169(1):62-74.
  • 2DAS M L,SAXENA A.SPAM:Secure protocol for authentication in mobile-communications[C].//Proceedings of the International Conference on Mobile Business,2005:23-27.
  • 3WONG D S,CHAN A H.Mutual authentication and key exchange for low power wireless communications[C].//Military Communications Proceedings Communications for Network-Centric Operations:Creating the Information Force,2001:39-43.
  • 4SHIM K.Cryptanalysis of mutual authentication and key exchange for low power wireless communications[J].IEEE Communications Letters,2003,7(5):248-250.
  • 5MCMILLAN K L.Symbolic model checking[M].Klu-wer Academic Publishers,1993.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部