期刊文献+

非安全网络上的认证方法 被引量:1

Protected Password Transmission Over Untrusted Networks
在线阅读 下载PDF
导出
摘要 本文提出一种在非安全网络上不使用对称加密算法,也不使用公开密钥算法(如DES,RC5,RSA等),而仅使用单向散列函数(如SHA,MD5),进行远端用户的身份认证和远端用户的口令修改的方法。此方法简单高效。
出处 《微计算机应用》 2003年第6期336-338,共3页 Microcomputer Applications
基金 江西省教育厅电子类专业学生创新教育基金(课题代码:ZJ0039)。
  • 相关文献

参考文献3

  • 1Scheier B吴世忠译.应用密码学[M].北京:机械工业出版社,1999..
  • 2Halevi, S. Krawczyk, H., Public key cryptography andpassword protocols. Proceedings of 5th ACM Conference on Computer and Communications Security, 1998, 122 131.
  • 3Botting, J.Security on the Internet:Authenticating the User[J]. Telecommunications, 1997,31(12): 77-80.

同被引文献8

  • 1David P. Lytle, Veronica Resendez, Dr. Robert August, “Security in the Residential Network” on SIGUCCS'05, November 6 -9, 2005, Monterey, California, USA.
  • 2Geon - Woo Kim, Do - Woo Kim, Jun - Ho Lee, Jin - Beon Hwang, Jong - Wook Han “Considerations on Security Model of Home Network” on ICACT2006 ,. Feb. 20 - 22, 2006.
  • 3Hea Suk Jo and Hee Yong Youn. A Secure User Authentication Protocol Based on One - Time - Password for Home Network. at ICCSA 2005. 519 - 528.
  • 4Sung - Woon Lee, Hyun - Sung Kim, and Kee - Young Yoo. Improved Efficient Remote User Authentication Scheme using Smart Cards. IEEE Transactions on Consumer Electronics, 2004,50 (2) :565 - 567.
  • 5Yingjie Wang and Jianhua Li, “Security Improvement on a Timestamp -based Password Authentication Scheme”, IEEE Transactions on Consumer Electronics, 2004,50(2) :580 - 582.
  • 6UPnP Forum, UPnP Security Ceremonies Version 1. 0, 2003.
  • 7W. Diffie, P. C. Van Oorschot, and M. J. Wiener, “Authentication and Authenticated Key Exchanges”, Designs, Codes and Cryptography, v. 2,1992.
  • 8Chi - Chun Lo and Yu - Jen Chen, “Secure Communication Mechanisms for GSM Networks” at IEEE Transactions on Consumer Electronics, Vol. 45, No. 4, November 1999.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部