期刊文献+

基于身份认证密钥交换手机游戏平台

Identity-based Authenticated Key Exchange for Mobile Gaming Platform
在线阅读 下载PDF
导出
摘要 针对手机游戏环境中信息安全隐患频现,提出一种基于公钥密码的有效身份认证的密钥交换协议,该协议可以实现服务器端和游戏终端的相互认证,会话密钥协商,用以提供及保护在不安全的网络通信中实现一种高效的简易安全通信技术,从而为无线网络游戏提供一种安全的运行环境。 In the current environment, wireless mobile gaming information security risks are frequent in the case. Present a valid public key cryptography based on authentication and key exchange protocol that can achieve both terminal server and the game of mutual authentication, negotiation sessions key, to provide protection in an insecure network and communication to achieve an efficient secure communications technology simple, so as to provide a secure wireless network to run the game environment.
机构地区 郑州师范学院
出处 《价值工程》 2012年第12期154-155,共2页 Value Engineering
关键词 身份认证 密钥交换 协议 手机游戏 authentication key exchange agreement mobile game
  • 相关文献

参考文献4

二级参考文献24

  • 1刘敏,简艳英.对一种门限代理签名方案的研究[J].通信技术,2008(5):140-141. 被引量:4
  • 2Cheon J H, Kim Y, Yoon H J. A New D-Based Signature with Batch Verification [DB/OL]. (2004-5-31)[2008-05-10]. http://eprint. iacr. org/2004/131.
  • 3Pointcheval D, Stern J. Security Arguments for Digital Signatures and Blind Signatures[J]. Journal of Cryptology, 2000,13(03): 361-396.
  • 4Diffie W, Hellman M E. New Directions in Cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(06):644-654.
  • 5Barreto P, Kim H Y, Lynn B, et al. Efficient Algorithms for Pairing-Based Cryptosystems[C].UK: Springer-Verlag, 2002: 354-368.
  • 6Mitola J, Maguire G. Cognitive radio: making software radios more personal[J]. IEEE Personal Commun, 1999,6(4) : 13-18.
  • 7Akyildiz I F, Lee W, Vuran M C, et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey[J]. Computer Networks J, 2006,50(13) : 2127-2159.
  • 8Cormiob C, Chowdhurya K R. A survey on MAC protocols for cognitive radio network[J]. Ad Hoc Networks. Elsevier B. V. 2009,7(7) :1315-1329.
  • 9Zhao Q, Tong L, Swami A, et al. Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMPD framework [J]. IEEE Journal on Selected Areas in Communications ( JSAC), 2007,25 ( 11 ) : 589-600.
  • 10Su H, Zhang X. Opportunistic MAC protocols for cognitive radio based wireless networks[A] //Proceedings of the 41st IEEE CISS Conference, 2007[C]. Baltimore, MD: IEEE Information Sciences and Systems, 2007 : 363-368.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部