期刊文献+

动态会议认证系统及构造

Authentication Schemes and Their Construction for Dynamic Conferences
下载PDF
导出
摘要 本文研究了网络安全中重要的两类认证系统 :动态会议认证系统 ,以及网络拓扑结构不是完全图的认证系统———通信图认证系统。说明了他们在某一安全水平下 ,信源集。 In the paper,we discuss two important authentication schemes used in network security:authentication schemes for dynamic conferences and authentication schemes for computer networks with topology which is not the complete graph.We show the size of the secret key space for each participant under the security level and provide their constructions
出处 《信息工程大学学报》 2001年第4期6-9,共4页 Journal of Information Engineering University
关键词 认证码 网络安全 动态会议认证系统 通信图认证系统 计算机网络 authentication code dynamic conference communication graph
  • 相关文献

参考文献1

二级参考文献8

  • 1[1]L.harn,H.Y.Lin.A cryptographic keys generation scheme for multilevel data security [J].Computer security,1990,9:539-546.
  • 2[2]Vincent Nicomette and Yves deswarte.A multilevel security model for distributed object systems [J].Proceedings in Computer Security,Esorics 96.
  • 3[3]R.s.sandhu and P.samarati,Access control:principles and practies [J].IEEE communications,1994,32(9):40-48.
  • 4[4]Takayuki Tachikawa,Hiroaki Higaki,Makoto Takizawa.Purpose-oriented access control model in object-based systems [A].In Proceedings ACISP′97 [C],1997,7:38-49.
  • 5[5]G.Horng.A key management approach for access control in user hierarchies [J].Proc.Of International Computer symposium,Hsinchu,TaiWan,1994:439-444.
  • 6[6]H.M.Tsai,C.C.Chang.A cryptogaryphic implementation for dynamic access control in a user hierarchy [J].compute and security,1995,14:159-166.
  • 7[7]Chu-Hsing Lin.Dynamic key management schemes for access control in a hierarchy [J].Computer comminication,1997,20(15):1381-1385.
  • 8[8]D.Bell and L.Lapadula.Secure computer systems:unified exposition and multics interpretation [R].Tech.Rep.MTR-2997,MITRE Co.,1975,7.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部