期刊文献+

基于MD5签名及CAS认证的移动门户设计

下载PDF
导出
摘要 为解决移动门户系统有效识别用户真实身份与角色,并对用户敏感数据进行安全可靠的保护的问题,提出了将统一身份认证系统与移动门户对接并在数据转换及传输阶段采用MD5签名,保证数据的完整性和真实性,从而为iOS平台及Android平台用户同时提供安全性较高、差错率较小的移动服务。为降低移动数据流量和屏蔽系统差异,提出了使用中央数据转换器以轻量级数据格式完成移动客户端与后端数据库服务器交互的方式。
出处 《物联网技术》 2016年第9期67-69,75,共4页 Internet of things technologies
基金 国家自然科学基金(61472313)
  • 相关文献

参考文献10

  • 1赵婧,李鑫,邓凌娟,李兴华,马建峰.无线网络中身份认证协议选择方法[J].计算机研究与发展,2015,52(3):671-680. 被引量:14
  • 2Mishra D. Design and Analysis of a Provably Secure Multi-serverAuthentication Scheme[J].Wireless Personal Communications,2016,86(3):1095-1119.
  • 3Chen H C, Violetta M A, Yang C Y. Contract RBAC in cloudcomputing[J].Journal of Supercomputing, 2013, 66(2):1111-1131.
  • 4Yang Zan, Wang Jian-xin, Yang Lin, et al. The RBAC model andimplementation architecture in multi-domain environment[J].Electronic Commerce Research, 2013, 13(3):273-289.
  • 5Sarasa-Cabezuelo A, Sierra J L.Grammar-driven development ofJSON processing applications[C]. 2013 Federated Conference onComputer Science and Information Systems( FedCSIS). [S.l.] :IEEE, 2013 :1557-1564.
  • 6Abd El-Aziz A A, Kannan A. JSON encryption[C]. 2014International Conference on Computer Communication andInformatics( ICCCI). Coimbatore :IEEE, 2014 :1-6.
  • 7Wehner P, Piberger C, GoHringer D. Using JSON to managecommunication between services in the Internet of Things[C].20149 t h I n t e r n a t i o n a l Symp o s i um o n Re c o n f ig u r a bl e a n dCommunication-Centric Systems-on-Chip( ReCoSoC). [S.l.] :IEEE, 2014 :1-4.
  • 8沈璇,赵光耀,李超,李瑞林.MD5加密模式的差分故障分析[J].应用科学学报,2015,33(5):481-490. 被引量:3
  • 9刘云峰,李丽,王素美,王倩宜,杨旭,欧阳荣彬,龙新征.面向大数据的数据服务中心设计与应用研究[J].通信学报,2013,34(S2):170-174. 被引量:10
  • 10Hughes G, Dobbins C. The utilization of data analysis techniquesin predicting student performance in massive open online courses(MOOCs)[J].Research & Practice in Technology EnhancedLearning, 2015, 10(1):1-8.

二级参考文献31

  • 1龙新征,欧阳荣彬,王倩宜,李丽,刘云峰.基于SSI模型的综合查询系统的设计与实现[J].武汉大学学报(理学版),2012,58(S1):242-246. 被引量:1
  • 2张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 3Simon D, Aboba B, Hurst R, et al. The EAP-TLS Authentication Protocol [S]. Fremont, CA: The Internet Engineering Task Force (IETF), 2008.
  • 4Funk P, Wilson S. Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol, Version 0 [S]. Fremont, CA: The Internet Engineering Task Force (IETF), 2008.
  • 5Palekar A, Simon D, Salowey J, et al. Protected Extensihle Authentication Protocol (PEAP), Version 2. 0 [S]. Fremont, CA: The Internet Engineering Task Force (IETF), 2002.
  • 6Lee Yongki, Batina L, Singelee D, et al. Low-cost untraceable authentication protocols for RF1D [C] //Proc of the 3rd ACM Conf on Wireless Network Security. New York; ACM,' 2010.. 55-64.
  • 7D'Arco P, Santis A. On ultralightweight RFID authentication protocols [J]. Dependable and Secure Computing, 2011, 8(4): 548-563.
  • 8Wei Hui, Hwang Shiang, Chin Yehhao. A mutual authentication protocol for FRID [J]. IT Professional, 2011, 13(2) 20-24.
  • 9Piramuthu S. RFID mutual authentication protocols [J]. Decision Support Systems, 2010, 50(2): 387-393.
  • 10Kumar P, Choudhury A, Sain M, et al. RUSAN: A robust user authentication framework for wireless sensor networks [J]. Sensors, 2011, 11(5): 5020-5046.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部