Since network services are provided cooperatively by multiple servers in the lnternet, the authentication protocols for multiserver architecture are required by Internetbased services, such as online game, online trad...Since network services are provided cooperatively by multiple servers in the lnternet, the authentication protocols for multiserver architecture are required by Internetbased services, such as online game, online trade and so on. Recently, Li et al. analyzed Lee et al.'s protocol and proposed an improved dynamic identity based authentication protocol for multi-server architecture. They claimed that their protocol provides user's anonymity, mutual authentication and the session key agreement against several kinds of attacks. In this paper, a cryptanalysis on Lee et al.'s scheme shows that Lee et al's protocol is also vulnerable to malicious server attack, stolen smart card attack and leak-of-verifier attack. Moreover, Li e/ al.'s improved protocol is also vulnerable to all these attacks. Further cryptanalysis reveals that Li et al.'s improved protocol is susceptible to collusion attack.展开更多
This paper puts forward sharing teaching resources based on cloud computing solutions, through the use of architecture means virtualization technology based on KVM on the server side, the infrastructure layer manage t...This paper puts forward sharing teaching resources based on cloud computing solutions, through the use of architecture means virtualization technology based on KVM on the server side, the infrastructure layer manage the underlying physical hardware equipment. In the realization of the infrastructure layer using Libvirt virtualization management suite that provides a common API development Web, through the RDP protocol, and finally access to the remote virtual desktop browser by the graphical user interface (GUI) and traditional Web B/S architecture, to simulate and access to low-level resources and sharing of teaching resources, teaching resources can be achieved education informatization in the process of teaching.展开更多
基金supported by the Key Program of NSFC-Guangdong Union Foundation under Grant No.U1135002Young Foundation of Humanities and Social Sciences of MOE (Ministry of Education in China) of under Grant No.11YJCZH160Foundation for Young Scientists of Jiangxi Province of China under Grant No.20133BCB23016
文摘Since network services are provided cooperatively by multiple servers in the lnternet, the authentication protocols for multiserver architecture are required by Internetbased services, such as online game, online trade and so on. Recently, Li et al. analyzed Lee et al.'s protocol and proposed an improved dynamic identity based authentication protocol for multi-server architecture. They claimed that their protocol provides user's anonymity, mutual authentication and the session key agreement against several kinds of attacks. In this paper, a cryptanalysis on Lee et al.'s scheme shows that Lee et al's protocol is also vulnerable to malicious server attack, stolen smart card attack and leak-of-verifier attack. Moreover, Li e/ al.'s improved protocol is also vulnerable to all these attacks. Further cryptanalysis reveals that Li et al.'s improved protocol is susceptible to collusion attack.
文摘This paper puts forward sharing teaching resources based on cloud computing solutions, through the use of architecture means virtualization technology based on KVM on the server side, the infrastructure layer manage the underlying physical hardware equipment. In the realization of the infrastructure layer using Libvirt virtualization management suite that provides a common API development Web, through the RDP protocol, and finally access to the remote virtual desktop browser by the graphical user interface (GUI) and traditional Web B/S architecture, to simulate and access to low-level resources and sharing of teaching resources, teaching resources can be achieved education informatization in the process of teaching.