期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
GPRS终端拨号上网连接认证注册全过程研究 被引量:12
1
作者 赵锋 王艳玮 +1 位作者 范建华 李琪 《计算机工程与应用》 CSCD 北大核心 2004年第23期158-160,共3页
论文详细研究了GPRS终端拨号上网连接认证注册的全过程,并通过实例给出了GPRS上网登录过程中必需的LCP、PAP、CHAP、IPCP等协议的内容、流程及处理方式,对采用GPRS技术进行数据交换系统的开发提供编程指导。
关键词 GPRS技术 LCP协议 PAP协议 CHAP协议 IPCP协议 拨号上网 连接认证注册
下载PDF
基于连接认证的低功耗蓝牙泛洪攻击防御方案 被引量:5
2
作者 王启林 李小鹏 +1 位作者 郁滨 黄一才 《计算机应用研究》 CSCD 北大核心 2017年第2期499-502,547,共5页
针对低功耗蓝牙易受泛洪攻击的问题,提出了一种连接认证模型,基于该模型设计了低功耗蓝牙泛洪攻击防御方案。方案结合HMAC(hash-based message authentication code)运算速度快与蓝牙通信同步性强的特点,设计检测模块判断通信状态,利用... 针对低功耗蓝牙易受泛洪攻击的问题,提出了一种连接认证模型,基于该模型设计了低功耗蓝牙泛洪攻击防御方案。方案结合HMAC(hash-based message authentication code)运算速度快与蓝牙通信同步性强的特点,设计检测模块判断通信状态,利用挑战应答的方式设计连接请求认证协议,在蓝牙协议运行前进行主从设备双向认证,过滤掉攻击报文,保证低功耗蓝牙连接建立的安全。安全性分析和实验结果表明,方案能够有效防御泛洪攻击,同时具有较小的存储和计算开销,适合应用于低功耗蓝牙中。 展开更多
关键词 低功耗蓝牙 泛洪攻击 连接认证 密钥相关的哈希运算消息认证
下载PDF
一种动态口令认证方案的研究与改进 被引量:2
3
作者 雷文 赵攀 张弘 《四川理工学院学报(自然科学版)》 CAS 2009年第5期47-50,共4页
分析研究了一种动态口令方案,针对其不足,对原方案中认证依据的产生以及连接认证依据的产生进行了改进,增强了原方案的认证依据产生和修改的灵活性,实现了连接认证双方协商产生,并保留了原方案的设计思想。改进方案提高了原方案的整体... 分析研究了一种动态口令方案,针对其不足,对原方案中认证依据的产生以及连接认证依据的产生进行了改进,增强了原方案的认证依据产生和修改的灵活性,实现了连接认证双方协商产生,并保留了原方案的设计思想。改进方案提高了原方案的整体安全性,并更具实用性。 展开更多
关键词 动态口令 认证 连接认证 安全性 改进
下载PDF
An Enhanced Direct Anonymous Attestation Scheme with Mutual Authentication for Network-Connected UAV Communication Systems 被引量:3
4
作者 Liquan Chen Sijie Qian +1 位作者 Ming Lim Shihui Wang 《China Communications》 SCIE CSCD 2018年第5期61-76,共16页
In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anony... In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation(DAA) is an attractive cryptographic scheme that provides an elegant balance between platform authentication and anonymity. However, because of the low-level computing capability and limited transmission bandwidth in UAV, the existing DAA schemes are not suitable for NC-UAV communication systems. In this paper, we propose an enhanced DAA scheme with mutual authentication(MA-DAA scheme), which meets the security requirements of NC-UAV communication systems. The proposed MA-DAA scheme, which is based on asymmetric pairings, bundles the identities of trusted platform module(TPM) and Host to solve the malicious module changing attacks. Credential randomization, batch proof and verification, and mutual authentication are realized in the MA-DAA scheme. The computational workload in TPM and Host is reduced in order to meet the low computation and resource requirements in TPM and Host.The entire scheme and protocols are presented,and the security and efficiency of the proposed MA-DAA scheme are proved and analyzed.Our experiment results also confirm the high efficiency of the proposed scheme. 展开更多
关键词 network-connected UAV trusted computing direct anonymous attestation mutual authentication trusted platform module
下载PDF
A Trusted Measurement Scheme Suitable for the Clients in the Trusted Network 被引量:3
5
作者 GONG Bei ZHANG Jianbiao +1 位作者 YE Xiaolie SHEN Changxiang 《China Communications》 SCIE CSCD 2014年第4期143-153,共11页
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network... The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 展开更多
关键词 trusted computing trusted network AUTHENTICATION state measurement real-time measurement
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部