期刊文献+

一种高效的WTLS握手协议 被引量:5

Secure and efficient WTLS handshake protocol
在线阅读 下载PDF
导出
摘要 无线传输层安全(WTLS)协议起着保证无线网络通讯安全的重要作用,其中高效的握手协议设计意味着客户端能与服务器更快捷地建立安全通道,并减少客户端的资源浪费。提出一种轻量级在线计算开销的WTLS握手协议L-WTLS,该协议通过优化握手流程,降低客户端在线计算量,有效提高建立安全通道的效率。 The primary goal of Wireless Transport Layer Security (WTLS) is to provide the security of the wireless communication. An efficient WTLS handshake protocol would speed up establishing the session between the client and the server, and at the same time reduce the spending of resource on the mobile. A new WTLS handshake protocol called Light online compute WTLS (L-WTLS) was proposed. L-WTLS was much more economic since it had less computation, especially the online ones. At last, that the L-WTLS is more suitable for the low power mobile terminal is proved.
出处 《计算机应用》 CSCD 北大核心 2008年第11期2798-2800,共3页 journal of Computer Applications
关键词 无线传输层安全 在线计算 会话密钥 前向攻击 用户匿名攻击 Wireless Transport Layer Security (WTLS) online compute session key forward secrecy user anonymity
  • 相关文献

参考文献8

  • 1KWARK D J, HA J C, LEE H J, et al. A WTLS handshake protocol with user anonymous and forward secrecy[ C]// Proceedings of the 7th CDMA International Conference, LNCS 2524. Berlin: Springer-Verlag, 2002:219-230.
  • 2HANKERSON D, MENEZES A J, VANSTONE S. Guide to elliptic curve cryptography[ M]. Berlin: Springer-Verlag, 2004.
  • 3BAKALOV R. Introduction to WAP's wireless transport layer security[ J]. Information Security Technical Report, 2000, 5(3) : 20 - 21.
  • 4PARK D G, BOYD C, MOON S J. Forward secrecy and its application to future mobile communications security[ C]// Proceedings of the 3rd International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography, LNCS 1751. London: Soringer-Verlag, 2000:433-445.
  • 5WONG D S, CHAN A H. Mutual authentication and key exchange for low power wireless communications[ C]// Military Communications Conference on Communications for Network-Centric Operations: Creating the Information Force. Washington, DC: IEEE Computer Society, 2001:39 -43.
  • 6HE YI-JUN, XU NAN, LI JIE. A secure key exchange and mutual authentication protocol for wireless mobile communications [ C]// Proceedings of the 2nd International Conference on Availability, Reliability and Security. Washington. DC: IEEE Computer Society, 2007:558-563.
  • 7LENSTRA A K, VERHEUL E R. Selecting cryptographic key sizes [ C]// Proceedings of the 3rd International Workshop on Practice and Theory in Public: Key Cryptography: Public Key Cryptography. London: Springer-Vcrlag, 2000:446-465.
  • 8JURISIC A, MENEZES A J. ECC whitepapers: Elliptic curves and cryptography[ EB/OL]. [ 2008 - 03 - 01 ]. http://www, certicom. com/research/weccrypt, html.

同被引文献31

  • 1邹学强,冯登国.WTLS握手协议的安全性分析及改进[J].中国科学院研究生院学报,2004,21(4):494-500. 被引量:6
  • 2王治国,肖德贵湖南大学计算机与通讯学院.基于无线PKI的微型证书的分析与实现[J].科学技术与工程,2006,6(3):278-282. 被引量:4
  • 3周永彬,张振峰,冯登国.一种认证密钥协商协议的安全分析及改进[J].软件学报,2006,17(4):868-875. 被引量:16
  • 4Koopman,Philip.Embedded system security[J].Computer,2004(37)7:95-97.
  • 5Tzvetkov,Vesselin.Disaster coverable PKI model based on Majority Trust principle.International Conference on Information Technology:Coding Computing,ITCC,v2,International Conference on Information Technology:Coding Computing[J].ITCC,2004(2):118-119.
  • 6Kent S,Atkinson R.Security architecture for the internet protocol[M].RFC2401,1998.
  • 7Bruce Schneier.Applied Crytography Second Edition:protocol,algorithms,and source code in C[M].John Wiley & Sons,Inc,1996.
  • 8何德全,肖国镇,卿斯汉,等.安全协议[M].北京:清华大学出版社,2005:215-217.
  • 9WAP Forum. Wireless Application Protocol Wireless Transport Layer Security Specification Version 06-Apt-2001 [EB/OL. ht- tp://www, wapforum, org, 2011-03.
  • 10Kwak D, Ha J C, Lee H. A WTLS Handshake Protocol with U- ser Anonymity and Forward Secrecy[C] // Proceedings of Mo- bile Communications the 7th CDMA International Conference. LNCS 2524. Berlin. Springer-Verlag, 2002 : 219-230.

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部