期刊文献+

网络安全中认证协议的分析与比较 被引量:2

Analysis and Comparation of Authentication Protocol in Network Security
下载PDF
导出
摘要 介绍网络安全中身分认证的基本方式 ,分析比较一次性口令认证、Kerberos认证和公钥认证协议 ,并指出了它们各自的特点 。 This paper introduces the essential methods of the identity authentication in network security, and analyses some typical protocols such as protocols of one time password authentication, Kerberos authentication and public key authentication. We can choose the appropriate protocol in the practical network by comparing the performance of the three protocols.
作者 龚晶 邓元庆
机构地区 解放军理工大学
出处 《中国有线电视》 北大核心 2004年第8期16-19,共4页 China Digital Cable TV
关键词 网络安全 认证协议 身分认证 密钥 口令认证 KERBEROS认证 identity authentication network security key
  • 相关文献

参考文献2

二级参考文献5

  • 1Haller N,Metz C,Nesser P, etc.A One-Time Password System[].RFC.1995
  • 2Haller N.The S/KEY One-Take Password System (OTP )[].RFC.1995
  • 3Rivest R.The MDS Message-Digest Algorithm[].RFC :.1992
  • 4Fraieds J,Hallam-Baker P,Hostetler J, etc.HTTP Authentication: Basic and Digest Access Authentication[].RFC.1999
  • 5李中献,詹榜华,杨义先.认证理论与技术的发展[J].电子学报,1999,27(1):98-102. 被引量:82

共引文献39

同被引文献14

  • 1彭红.从802.11、802.1x论无线网络的安全性[J].计算机系统应用,2003,12(9):36-38. 被引量:4
  • 2林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4President's Information Technology Advisory Committee. Cyber Security: a Crisis of Prioritization [ R ].National Coor- dination Office for Information. Technology Research and Development. 2005,2 : 37-38.
  • 5Alauddin Y A, Mohammad S J. New Trends on Security In- frastructure for Computer Networks [C ]//2004 International Conference on Information and Communication Technolo- gies: From Theory to Application, 2004.
  • 6El-hadidi M T, Hegazi N H, Aalan H K. Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution [ C ]//Proceedings of the 4 IEEE Inter- national Symposium on Computers and Communications. IEEE Computer Society Press, Los Alamitos, Calif, 1999.
  • 7Zhang Y, Fujise M. An Improvement for Authentication Pro- tocol in Third-Generation Witless Network [J].IEEE Transaction on Wireless Communications,2006,5 (9) : 2348-2352.
  • 8Harbitter A, Menasee D. A Methodology for Analyzing the Performance of Authentication Protols [J ].ACM Transac- tions on Information and System Security, 2002,5 (4) : 458 - 491.
  • 9Liang W,Wang W Y. An Analytical Study on the Impact of Authentication in Wireless local Area Network [C]//Pro- ceedings of 13 International Conference on Computer Com- munications and Networks, 2004.
  • 10Liang W, Wang W Y. A Lightweight Authentication Proto- col with Local Security Association Control in Mobile Net- works [ C ]//2004 IEEE Military Communications Confer- ence, 2004.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部