期刊文献+

一种通讯过程中末端设备切换的安全认证方案

Secure authentication scheme for migration of devices in communication
在线阅读 下载PDF
导出
摘要 身份认证过程的安全性对于实现网络通信中的移动末端设备切换十分重要。阐述了一种基于密钥隔离方案的通信过程中的末端设备切换的认证方案,对认证方案的特点及安全性进行了分析。指出了由于具有安全性和方便性,这种方案能够满足进行移动通讯设备的末端设备切换的要求。 Security in process of authentication is very important to realize a migration of mobile terminals in network. An authentication scheme basing on key-insulated public key cryptosystem is described in detail, which was used for a continuous communication across devices and networks and of which the security and characteristics were analyzed. It is demonstrated that the authentication scheme can meet the requirement of the migration of mobile terminal devices because of its security and convenience.
作者 田暄 叶顶锋
出处 《计算机工程与设计》 CSCD 北大核心 2005年第7期1915-1917,共3页 Computer Engineering and Design
关键词 认证方案 密钥隔离 设备切换 authentication scheme key-insulated migration of devices
  • 相关文献

参考文献8

  • 1Kaneko K, Morikawa H, Aoyama T. Session layer mobility support for 3C everywhere environments[C]. Japan:Proc of the 6th International Symposium on Wireless Persona Multimedia Communication (WPM 2003),2003.347-351.
  • 2Charles E Perkins. IP mobility support for IPv4.[S/OL]. RFC3220, Internet Engineering Taskforce, http://www. faqs.org/rfcs/rfc3220.html,2002-01.
  • 3David Maltz, Pravin Bhagwat. MSOCKS: An architecture for transport layer mobility [C]. San Francisco, California: Proc IEEE Infocom, 1998.1037-1045.
  • 4Jayanth Mysore, Vaduvur Bharghavan. A new multicasting based architecture for Internet host mobility[C]. Budapest, Hungary: Proc 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking, 1997.161 - 172.
  • 5Victor C Zandy, Barton P Miller. Reliable network connections[C]. Atlanta, Georgia: Proc 8th Annual ACM/IEEE International Conference on Mobile Computing and Networking, 2002.95-106.
  • 6Alex C Snoeren, Hart Balakrishnan. An end-to-end approach to host mobility[C]. Boston, Massachusetts:Proc 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking,2000.155-166.
  • 7Dodis Y, Katz J, Xu S, et al. Key-insulated public-key cryptosystems[C]. Advances in Cryptology -EUROCRYPT 2002, Lecture Notes in Computer Science, Springer-Verlag,2002.
  • 8Tadashi Okoshi, Masahiro Mochizuki, Yoshito Tobe, et al. Mobile socket: Toward continuous operation for java applications[C]. Proc IEEE International Conference on Computer Communications and Networks, Natick, Massachusetts, 1999.50-57.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部