期刊文献+

基于证书的无线认证协议的设计与分析

Design and Analysis of Certificate-based Wireless Authentication Protocol
下载PDF
导出
摘要 文章提出了一个基于数字证书的无线认证协议,实现了通信双方的相互认证,建立了一个经过双方确认的公正的会话密钥。通过BAN逻辑及各种可能的攻击分析,证明协议是安全的。 A certificate-based wireless authentication and key agreement protocol is presented.Mutual authentication of two sides of communication is achieved and the session key established by the protocol is fair for both sides.On the analysis of BAN-logic and some possible attacks,the protocol is secure.
作者 赵庆 刘玮
出处 《计算机工程与应用》 CSCD 北大核心 2003年第3期156-157,171,共3页 Computer Engineering and Applications
关键词 证书 无线认证协议 设计 通信协议 无线通信系统 BAN逻辑 公钥密码体制 手机 Certificate,Authentication,Wireless Communication,BAN Logic
  • 相关文献

参考文献10

  • 1[1]S Mohan.Privacy and Authentication Protocol for PCS[J].IEEE Personal Communic ations, 1996:34~38
  • 2[2]V Bharghavan. Secure Wireless LANs[C].In:ACM Conference on Computer and Communications Security, 1994:10~17
  • 3[3]C Park,K Kurosawa,T Okamoto et al.On Key Distribution and Authentication in Mobile Radio Networks[C].In:Proc of Advances in Cryptology-Eurocrypt '93,1993:461~465
  • 4[4]U Carlsen. Optimal Privacy and Authentication in Personal Communication System[J].Operating systems Review,1994;28(3)
  • 5[5]V Varadharajan,Y Mu.Preserving Privacy in Mobile communications: A Hybrid Method[C].In:IEEE Proc International conference on Personal communications, ICPWC '97,1997: 532~536
  • 6[6]M J Beller,L F Chang,Y Yacobi.Privacy and Authentication on a Portable Communication System[J].IEEE Journal on Selected Areas in Communications, 1993; 11 (6)
  • 7[7]C J Mithell,M Ward,P Wilson. Key control in key agreement protocols[J].IEE Electronics Letters,1998;34(10):980~981
  • 8[8]Michael Burrows,Martin Abadi ,Roger Needham. A logic of Authentieation[J].ACM Transactions on Computer Systems,1990;8(1):18~36
  • 9[9]Paul C Van Oorschot. Extending Cryptographie Logics of Belief to Key Agreement Protoeols[C].In:Proceedings of the First ACM Conference on Computer and Communications Security,1993-11:232~243
  • 10[10]P Janson,G Tsudik,M Yung. Scalability and Flexibility in Authentication Services:The KryptoKnight Approach[C].In:IEEE INFOCOM'97,1997: 735~736

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部