咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 3 篇 计算机科学与技术...
    • 3 篇 网络空间安全
    • 2 篇 信息与通信工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 2 篇 universally comp...
  • 2 篇 authentication
  • 2 篇 network security
  • 1 篇 key
  • 1 篇 802.11s
  • 1 篇 certificateless ...
  • 1 篇 group key exchan...
  • 1 篇 universal compos...
  • 1 篇 bilinear pairing...
  • 1 篇 verifiably smoot...
  • 1 篇 networks
  • 1 篇 mesh
  • 1 篇 hoc
  • 1 篇 concurrent denia...
  • 1 篇 bilinear
  • 1 篇 the decisional c...
  • 1 篇 pairings
  • 1 篇 provable
  • 1 篇 anonymous
  • 1 篇 hash

机构

  • 3 篇 mobile network s...
  • 2 篇 mobile network s...
  • 1 篇 mobile network s...
  • 1 篇 key laboratory o...
  • 1 篇 key laboratory o...
  • 1 篇 school of comput...
  • 1 篇 key laboratory o...
  • 1 篇 mobile network s...

作者

  • 4 篇 sangjae moon
  • 3 篇 ma jianfeng
  • 3 篇 moon sangjae
  • 1 篇 feng tao
  • 1 篇 cao chunjie
  • 1 篇 li fenghua
  • 1 篇 zhang fan

语言

  • 7 篇 英文
检索条件"作者=MOON Sangjae"
7 条 记 录,以下是1-10 订阅
排序:
Universally composable one-time signature and broadcast authentication
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 567-580页
作者: moon sangjae Mobile Network Security Technology Research Center Kyungpook National University
Broadcast authentication is a vital security primitive for the management of a copious number of parties. In the universally composable framework, this paper investigates broadcast authentication using one-time signat... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Provably Secure Identity-based Group Key Exchange Protocol
收藏 引用
China Communications 2007年 第4期4卷 11-22页
作者: sangjae moon Mobile Network Security Technology Research Center Kyungpook National University
Group key management is one of the basic building blocks in securing group communication.A number of solutions to group key exchange have been proposed,but most of them are not scalable and,in particular,require at le... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Authentication Methods for 802.11s Mesh Networks
收藏 引用
China Communications 2007年 第1期4卷 56-65页
作者: sangjae moon Mobile Network Security Technology Research Center
With the rapid development of the WLAN,the 802. 11 s mesh network is ***,adaptability and scalability are the most important attributes of a mesh ***,the security in an 802.11s mesh network is not well defined or spec... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Universally composable secure TNC model and EAP-TNC protocol in IF-T
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 465-482页
作者: moon sangjae Mobile Network Security Technology Research Center Kyungpook National University
This paper analyzes trusted network connect (TNC) protocols within the universally composable (UC) framework. We propose the first TNC model in the UC framework by first designing the TNC ideal functionality FTNC, the... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Universally composable anonymous Hash certification model
收藏 引用
Science in China(Series F) 2007年 第3期50卷 440-455页
作者: ZHANG Fan MA JianFeng sangjae moon Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian UniversityXi'an 710071 China Mobile Network Security Technology Research Center Kyungpook National University Sankyuk-dongBuk-ku Daeyu 702-701 Korea
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentica... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A new approach for UC security concurrent deniable authentication
收藏 引用
Science in China(Series F) 2008年 第4期51卷 352-367页
作者: FENG Tao LI FengHua MA JianFeng sangjae moon Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Computer and Communications Lanzhou University of Technology Lanzhou 730050 China Mobile Network Security Technology Research Center Kyungpook National University Sankyuk-dong Buk-ku Daeyu 702-701 Korea
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynch... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Provable Efficient Certificateless Group Key Exchange Protocol
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 41-45页
作者: CAO Chunjie MA Jianfeng moon sangjae Key Laboratory of Computer Networks and InformationSecurity Ministry of Education Xidian University Xi' an 710071Shaanxi China Mobile Network Security Technology Research Center Kyungpook National University Daeyu 702701 Korea
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论