期刊文献+
共找到786篇文章
< 1 2 40 >
每页显示 20 50 100
An Efficient Two-Party Key Exchange Protocol with Strong Security 被引量:2
1
作者 DENG Shaofeng LI Yifa DENG Yiqun 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期267-271,共5页
Combined public key (CPK) cryptography does not need certificates to guarantee the authenticity of public keys and avoids the inherent key escrow problem of identity-based cryptography. Based on the efficient CPK sc... Combined public key (CPK) cryptography does not need certificates to guarantee the authenticity of public keys and avoids the inherent key escrow problem of identity-based cryptography. Based on the efficient CPK scheme, we present an efficient three-round two-party authenticated key exchange protocol with strong security, which is provably secure in the standard model under the decisional Diffie-Hellman (DDH) assumption. The protocol can keep the session key secret from the adversary except that one party's ephemeral private key and static private key are all revealed to the adversary. Compared to the existing protocols, this protocol not only assures strong security but also is more efficient. 展开更多
关键词 combined public key (CPK) authenticated key exchange protocol strong security standard model
原文传递
A Security Patch for a Three-Party Key Exchange Protocol 被引量:1
2
作者 ZHAO Jianjie GU Dawu 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期242-246,共5页
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round ... The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values VA and VB in the CLC protocol will make a man-in-the-middle attack feasible in practice, where VA and VB are the authentication information chosen by the server for the participants A and B. In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own pass- words by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol. 展开更多
关键词 information security AUTHENTICATION key exchange man-in-the-middle attack
原文传递
Security Analysis of Broadcaster Group Key Exchange Protocols
3
作者 LI Li ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1577-1580,共4页
Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of pr... Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper. 展开更多
关键词 group key exchange protocol broadcaster group protocols dynamic security
在线阅读 下载PDF
CLORKE-SFS:Certificateless One-Round Key Exchange Protocol with Strong Forward Security in Limited Communication Scenarios
4
作者 Xiaowei Li Dengqi Yang +1 位作者 Benhui Chen Yuqing Zhang 《China Communications》 SCIE CSCD 2021年第7期211-222,共12页
Certificateless one-round key exchange(CL-ORKE)protocols enable each participant to share a common key with only one round of communication which greatly saves communication cost.CLORKE protocols can be applied to sce... Certificateless one-round key exchange(CL-ORKE)protocols enable each participant to share a common key with only one round of communication which greatly saves communication cost.CLORKE protocols can be applied to scenarios with limited communication,such as space communication.Although CL-ORKE protocols have been researched for years,lots of them only consider what secrets can be compromised but ignore the time when the secrets have been corrupted.In CL-ORKE protocols,the reveal of the long-term key attacks can be divided into two different attacks according to the time of the long-term key revealed:the attack to weak Forward Security(wFS)and the attack to strong Forward Security(sFS).Many CLKE protocols did not take into account the sFS property or considered sFS as wFS.In this paper,we first propose a new security model for CL-ORKE protocols which considers the sFS property as well as the Ephemeral Key Reveal attack.Then,we give a CL-ORKE protocol which is called CLORKE-SFS.CLORKE-SFS is provably secure under the proposed model provided the Elliptic Curve Computational Diffie-Hellman(ECCDH)and the Bilinear Computational Diffie-Hellman problem(BCDH)assumption hold.The security model and the protocol may give inspiration for constructing oneround key exchange protocols with perfect forward security in certificateless scenarios. 展开更多
关键词 key exchange protocol strong forward security one-round CERTIFICATELESS
在线阅读 下载PDF
Forefront Security for Exchange维护实践
5
作者 吴启军 《Windows IT Pro Magazine(国际中文版)》 2008年第3期17-19,22,共4页
Forefront Security for Exchange采用了业界领先的多病毒扫描引擎。带来了强大的杀毒能力,与Exchange Server2007紧密结合提供了高效率。并具有易管理性。
关键词 exchange security 维护实践 扫描引擎 易管理性 杀毒
在线阅读 下载PDF
Forefront Security for Exchange Server的应用与优化
6
作者 王向阳 《Windows IT Pro Magazine(国际中文版)》 2008年第5期17-21,共5页
Microsoft Forefront Securitv是微软最新推出的面向企业全方位安全需求,功能完整的安全解决方案,其中的Forefront Security for Server便是专门针对部署在企业内部网络中的微软系列应用服务器的安全方案,目前包括Forefront Security... Microsoft Forefront Securitv是微软最新推出的面向企业全方位安全需求,功能完整的安全解决方案,其中的Forefront Security for Server便是专门针对部署在企业内部网络中的微软系列应用服务器的安全方案,目前包括Forefront Security for Exchange Server和Forefront Security for SharePoint Server。 展开更多
关键词 security exchange Server 应用服务器 SHAREPOINT MICROSOFT 企业内部网络 优化
在线阅读 下载PDF
STRONGER PROVABLE SECURE MODEL FOR KEY EXCHANGE
7
作者 任勇军 王建东 +1 位作者 徐大专 庄毅 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期313-319,共7页
The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single ... The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single unified security model is essential, The eCK , eCK and CK models are examined and the result is proved that the eCK' model is the strongest provable security model for the key exchange. The relative security strength among these models is analyzed. To support the implication or non-implication relations among these models, the formal proofs and the counter-examples are given. 展开更多
关键词 network security CRYPTOGRAPHY information security key exchange protocol
在线阅读 下载PDF
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element 被引量:2
8
作者 Chintan Patel Ali Kashif Bashir +1 位作者 Ahmad Ali AlZubi Rutvij Jhaveri 《Digital Communications and Networks》 SCIE CSCD 2023年第2期358-366,共9页
Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product processing.IIoT suffers from various challenges,and security is one of the key challenge among those challe... Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product processing.IIoT suffers from various challenges,and security is one of the key challenge among those challenges.Authentication and access control are two notable challenges for any IIoT based industrial deployment.Any IoT based Industry 4.0 enterprise designs networks between hundreds of tiny devices such as sensors,actuators,fog devices and gateways.Thus,articulating a secure authentication protocol between sensing devices or a sensing device and user devices is an essential step in IoT security.In this paper,first,we present cryptanalysis for the certificate-based scheme proposed for a similar environment by Das et al.and prove that their scheme is vulnerable to various traditional attacks such as device anonymity,MITM,and DoS.We then put forward an interdevice authentication scheme using an ECC(Elliptic Curve Cryptography)that is highly secure and lightweight compared to other existing schemes for a similar environment.Furthermore,we set forth a formal security analysis using the random oracle-based ROR model and informal security analysis over the Doleve-Yao channel.In this paper,we present comparison of the proposed scheme with existing schemes based on communication cost,computation cost and security index to prove that the proposed EBAKE-SE is highly efficient,reliable,and trustworthy compared to other existing schemes for an inter-device authentication.At long last,we present an implementation for the proposed EBAKE-SE using MQTT protocol. 展开更多
关键词 Internet of things AUTHENTICATION Elliptic curve cryptography secure key exchange Message Queuing telemetry transport
在线阅读 下载PDF
Provably Secure Identity-based Group Key Exchange Protocol
9
作者 SangJae Moon 《China Communications》 SCIE CSCD 2007年第4期11-22,共12页
Group key management is one of the basic building blocks in securing group communication.A number of solutions to group key exchange have been proposed,but most of them are not scalable and,in particular,require at le... Group key management is one of the basic building blocks in securing group communication.A number of solutions to group key exchange have been proposed,but most of them are not scalable and,in particular,require at least 0(log n) communication rounds.We formally present a constant -round Identity-based protocol with forward secrecy for group key exchange,which is provably secure in the security model introduced by Bresson et al.Our protocol focuses on round efficiency and the number of communication round is only one greater than the lower bound presented by Becker and Wille.And,the protocol provides a batch verification technique,which simultaneously verifies the validity of messages from other group participants and greatly improves computational efficiency.Moreover,in our protocol,it is no necessary of always-online key generation center during the execution of the protocol compared to other Identity-based protocols. 展开更多
关键词 provable security GROUP key exchange BILINEAR PAIRINGS
在线阅读 下载PDF
Modeling Stock Market Volatility Using GARCH Models: A Case Study of Nairobi Securities Exchange (NSE)
10
作者 Arfa Maqsood Suboohi Safdar +1 位作者 Rafia Shafi Ntato Jeremiah Lelit 《Open Journal of Statistics》 2017年第2期369-381,共13页
The aim of this paper is to use the General Autoregressive Conditional Heteroscedastic (GARCH) type models for the estimation of volatility of the daily returns of the Kenyan stock market: that is Nairobi Securities E... The aim of this paper is to use the General Autoregressive Conditional Heteroscedastic (GARCH) type models for the estimation of volatility of the daily returns of the Kenyan stock market: that is Nairobi Securities Exchange (NSE). The conditional variance is estimated using the data from March 2013 to February 2016. We use both symmetric and asymmetric models to capture the most common features of the stock markets like leverage effect and volatility clustering. The results show that the volatility process is highly persistent, thus, giving evidence of the existence of risk premium for the NSE index return series. This in turn supports the positive correlation hypothesis: that is between volatility and expected stock returns. Another fact revealed by the results is that the asymmetric GARCH models provide better fit for NSE than the symmetric models. This proves the presence of leverage effect in the NSE return series. 展开更多
关键词 NAIROBI securITIES exchange (NSE) Symmetric and Asymmetric GARCH Models VOLATILITY Leverage Effect
暂未订购
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
11
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2011年第2期77-81,共5页
This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmeti... This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmetic with complex modulus and another on an elliptic curve modular equation. The proposed algorithm is illustrated in a numerical example. 展开更多
关键词 Complex MODULUS Cryptanalytic Protection DECOMPOSITION GAUSSIAN MODULAR ARITHMETIC Information Hiding Key exchange MODULAR ELLIPTIC Curve secure Communication
在线阅读 下载PDF
Optimal Threshold Determination for Securities Exchange Volumes Using Improved Maximum Product of Spacing Methodology
12
作者 Peter Murage Joseph Mung’atu Everlyne Odero 《Open Journal of Statistics》 2019年第3期327-346,共20页
To Statisticians, the structure of the extreme levels which exist in the tails of the ordinary distributions is very important in analyzing, predicting and forecasting the likelihood of an occurrence of extreme event.... To Statisticians, the structure of the extreme levels which exist in the tails of the ordinary distributions is very important in analyzing, predicting and forecasting the likelihood of an occurrence of extreme event. Extreme events are defined as values of the event below or above a certain value called threshold. A well chosen threshold helps to identify the extreme levels. Several methods have been used to determine threshold so as to analyze and model extreme events. One of the most successful methods is the maximum product of spacing (MPS). However, there is a problem encountered while modeling data through this method in that the method breaks down when there is a tie in the exceedances. This study offers a solution to model data even when it contains ties. In the study, a method that improved MPS method for determining an optimal threshold for extreme values in a data set containing ties was derived. The Generalized Pareto Distribution (GPD) parameters for the optimal threshold were derived and compared to GPD parameters determined through the standard MPS model. The study improved the standard MPS methodology by introducing the concept of frequency and used Generalized Pareto Distribution (GPD) and Peak over threshold (POT) methods as the basis of identifying extreme values. The improved MPS models and the standard models were applied to Nairobi Securities Exchange (NSE) trading volume data to determine the GPD parameters for different sectors registered in NSE market and their performance compared. It was realized that the improved MPS model performed better than the standard models. This study will help the Statisticians in different sectors of our economy to model extreme events involving ties. 展开更多
关键词 Extreme Value Theory (EVT) MAXIMUM PRODUCT of SPACING (MPS) Generalized Pareto Distribution (GPD) Peaks over Threshold (POT) NAIROBI securITIES exchange (NSE)
暂未订购
基于SOAP协议的Web Service安全基础规范(WS-Security) 被引量:30
13
作者 石伟鹏 杨小虎 《计算机应用研究》 CSCD 北大核心 2003年第2期100-102,105,共4页
讨论了WebService现有安全解决方案存在的问题,阐述了WS Security规范的内容和架构,以及对此的解决方法;随后给出了一个在WS Security框架内进行安全信息交换的实例;最后,介绍了WS Secu rity现有的实现以及未来的发展方向。
关键词 SOAP WEBSERVICE 计算机网络 网络安全 安全信息交换 安全基础规范
在线阅读 下载PDF
基于Exchange 2010的安全邮件系统设计与实现
14
作者 任毅 《实验科学与技术》 2010年第6期25-28,共4页
电子邮件作为一种常用的通信方式在企业商务活动中有着非常重要的地位,它方便了企业内部与企业之间的沟通。但病毒、蠕虫、垃圾邮件、间谍软件和一系列更新、更复杂的攻击方法使电子邮件用户和企业所面临的安全性风险变得日益严重。文中... 电子邮件作为一种常用的通信方式在企业商务活动中有着非常重要的地位,它方便了企业内部与企业之间的沟通。但病毒、蠕虫、垃圾邮件、间谍软件和一系列更新、更复杂的攻击方法使电子邮件用户和企业所面临的安全性风险变得日益严重。文中以Microsoft Exchange Server 2010为基础,设计和实现了安全邮件系统所需要的网络拓扑结构,提出了邮件服务器与客户端数据传输安全解决方案,并使用Forefront Protection for Exchange Server实现对邮件病毒的清除和防垃圾邮件功能,使用Threat Management Gateway实现对邮件服务器访问控制及对企业网络访问的过滤,从根本上解决了邮件服务器安全访问问题。 展开更多
关键词 邮件系统 安全 exchange Server交换服务器
在线阅读 下载PDF
Exchange 2003和Exchange 2007对象权限管理的分析
15
作者 金晶 薛质 《信息安全与通信保密》 2009年第4期71-72,共2页
随着微软Exchange和Outlook的广泛应用,也受到了越来越多的安全攻击。为了提高其安全性,微软在Exchange 2007的开发中采用了比Exchange 2003更为安全和高效的权限管理机制,不但提出了更为合理的安全和权限模型,而且采用了更为有效的权... 随着微软Exchange和Outlook的广泛应用,也受到了越来越多的安全攻击。为了提高其安全性,微软在Exchange 2007的开发中采用了比Exchange 2003更为安全和高效的权限管理机制,不但提出了更为合理的安全和权限模型,而且采用了更为有效的权限管理工具。 展开更多
关键词 exchange 权限管理 安全
原文传递
Provable Efficient Certificateless Group Key Exchange Protocol 被引量:8
16
作者 CAO Chunjie MA Jianfeng MOON Sangjae 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期41-45,共5页
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present ... Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol. 展开更多
关键词 group key exchange certificateless public key cryptography provable security bilinear pairings
在线阅读 下载PDF
Universally Composable Three Party Password-based Key Exchange Protocol 被引量:4
17
作者 Deng Miaolei Ma Jianfeng Le Fulong 《China Communications》 SCIE CSCD 2009年第3期150-155,共6页
Within the framework of universal composability,an appropriate ideal functionality that captures the basic security requirements of three party password-based key exchange was defined. An efficient real-word three par... Within the framework of universal composability,an appropriate ideal functionality that captures the basic security requirements of three party password-based key exchange was defined. An efficient real-word three party password-based key exchange protocol was also proposed.This protocol securely realizes the ideal functionality with respect to static party corruption.Thus it provides security guarantees under arbitrary composition with other protocols. 展开更多
关键词 DIFFIE-HELLMAN ATTACK key exchange universally composable PROTOCOL security
在线阅读 下载PDF
Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications 被引量:2
18
作者 Li Wenmin Wen Qiaoyan Su Qi Zhang Hua Jin Zhengping 《China Communications》 SCIE CSCD 2012年第1期64-72,共9页
To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnera... To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications. 展开更多
关键词 mobile applications key exchange PASSWORD elliptic curve cryptosystem security
在线阅读 下载PDF
Simple and Efficient Password-Based Authenticated Key Exchange Protocol 被引量:1
19
作者 王立斌 潘嘉昕 马昌社 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期459-465,共7页
Password-based authenticated key exchange(PAKE) protocols are cryptographic primitives which enable two entities,who only share a memorable password,to identify each other and to communicate over a public unreliable n... Password-based authenticated key exchange(PAKE) protocols are cryptographic primitives which enable two entities,who only share a memorable password,to identify each other and to communicate over a public unreliable network with a secure session key.In this paper,we propose a simple,efficient and provably secure PAKE protocol based on Diffie-Hellman key exchange and cryptographic hash function.Our protocol is secure against dictionary attacks.Its security is proved based on the hardness of the computational Diffie-Hellman problem in the random oracle model. 展开更多
关键词 password authentication key exchange provable security
原文传递
Simple Three-Party Password Authenticated Key Exchange Protocol 被引量:1
20
作者 罗乃维 叶国晖 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期600-603,共4页
Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on pas... Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system e?ciency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness. 展开更多
关键词 authentication CRYPTANALYSIS error correction code (ECC) simple three-party password authenticated key exchange (S-3PAKE) security undetectable on-line dictionary attack
原文传递
上一页 1 2 40 下一页 到第
使用帮助 返回顶部