期刊文献+

基于智能卡的椭圆曲线身份认证方案

The elliptic curve identity authuntion system based on smart card
下载PDF
导出
摘要 密码身份验证已广泛应用于计算机网络提供安全的远程访问控制,改进了Islam与Biswas提出的应用智能卡的椭圆曲线密码身份验证系统。通过与其他相关方案对比发现,本方案不仅解决了许多恶意攻击的安全问题,而且能够满足更多的功能特性。 The password authentication technology has been widely used in computer networks for provide secure remote access control.This paper has introduced the smart card technology to improved the Islam and Biswas suggested password authentication system based on elliptic curve.In comparison with other related schemes,this scheme not only solved many malicious attacks security issues but also meet more functional characteristics.
出处 《激光杂志》 CAS CSCD 北大核心 2014年第11期91-94,共4页 Laser Journal
关键词 椭圆曲线 智能卡 身份认证 安全性 恶意攻击 Elliptic curve Smart card The identity authentication Security Malicious attacks
  • 相关文献

参考文献16

  • 1Li, C.T., Lee, C.C., Wang, L.J., Liu, C. A secure billing ser- vice with two-factor user authentication in wireless sensor networks[J].Int. J. Innov.Comput, 2011, 7(8): 4821 - 4831.
  • 2Li, C.T., Lee, C.C. A novel user authentication and privacy preserving scheme with smart cards for wireless communi- cations[J]. Math. Comput. Model, 2012, 55(1-2): 35-44.
  • 3Lamport, L. Password authentication with insecure commu- nication,Commun[J]. ACM, 1981, 24(11): 770-772.
  • 4Hwang, J.J., Yeh, T.C. Improvement on Peyravian - unic' s password authentication schemes[J]. IEICE Trans. Com- mun, 2002, 7(4): 823-825.
  • 5Lin, C.L., Hwang, T. A password authentication scheme with secure password updating[J], Comput. Secur, 2003, 22 (1):68-72.
  • 6Peyravian, M., Jeffries, C. Secure remote user access over insecure networks[J], Comput. Commun, 2006, 29(5): 660-667.
  • 7Das, A.K. Analysis and improvement on an efficient biomet- tic-based remote user authentication scheme using smart cards[J], IET Inf. Secur,2011,5(3): 145-151.
  • 8Li, C.T. Secure smart card based password authentication scheme with user anonymity[J], Inf. Technol. Control, 2011, 40(2): 157-162.
  • 9Song, R. Advanced smart card based password authentication [J],Comput. Stand. Interfaces, 2010, 32(5):321-325.
  • 10Wang, R.C., Juang, W.S., Lei, C.L. Robust authentication and key agreement scheme preserving the privacy of secret key[J], Comput.Commun, 2011, 34(3): 274-280.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部