期刊文献+

改进的IMS跨域间认证密钥协商协议 被引量:1

An Improved IMS Cross-domain Key Authenticated Agreement Protocol
下载PDF
导出
摘要 针对已有跨域间密钥协商协议与IP多媒体子系统(IMS)会话建立过程不相匹配及安全性较差等问题,分析了IMS会话建立过程,研究了端到端信息传输的安全需求,提出一种改进的IMS跨域间认证密钥协商协议IKAAP,并进行了安全性分析。结果表明,改进后的协议能够保证终端用户在三网融合环境下实现端到端信息的安全传输。 Aiming at session process between cross-domain key agreement protocol and IP multimedia subsystem(IMS)does not match and security poor,process of IMS session establishment is analyzed,security requirements of end-to-end information transmission is studied,an improved IMS cross-domain key authenticated agreement protocol(IKAAP)is put forward,and improved protocol's security is analyzed.Result shows that the improved protocol can guarantee the end user in the triple play environment to realize the end-to-end security information transmission.
出处 《舰船电子工程》 2016年第5期105-108,共4页 Ship Electronic Engineering
关键词 IP多媒体子系统 跨域 认证密钥协商协议 IP multimedia subsystem cross-domain key authenticated agreement protocol
  • 相关文献

参考文献9

二级参考文献31

  • 1路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32
  • 2彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 3Foster I, Kesselman C, Tsudik G, et al. A Security Architecture for Computational Grids[C]//Proceedings of the 5th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 1998: 83-92.
  • 4Wenbo M. An Identity-based Non-interactive Authentication Framework for Computational Grids[R]. Hewlett-Packard Laboratories, Technical Report: HPL-2004-096, 2004.
  • 5Li Hongwei, Sun Shixin. Identity-Based Cryptography for Grid[C]// Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/ Distributed Computing. Washington, USA: IEEE Computer Society 2007: 132-137.
  • 6Mark W. The Computer for the 21st Century[J]. Scientific American, 1991, 265(3): 66-75.
  • 7Tuladhar S R, Carlos E, Caicedo C E, et al. Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Network[C]//Proc. of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. Taichung, Taiwan, China: [s. n.], 2008.
  • 8Wong F L. Protocols and Technologies for Security in Pervasive Computing and Communications[D]. Cambridge, USA: University of Cambridge, 2008.
  • 9Hwang Ren-Junn, Su Feng-Fu. A New Efficient Authentication Protocol for Mobile Networks[J]. Computer Standards & Interfaces, 2005, 28(2): 241-252.
  • 10Zheng Yuliang, Imai H. Compact and Unforgeable Key Establishment over an ATM Network[C]//Proc. of the 17th Annual Joint Conference on IEEE Computer and Communications Societies. San Francisco, USA: [s. n.], 1998.

共引文献21

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部