咨询与建议

限定检索结果

文献类型

  • 27 篇 期刊文献

馆藏范围

  • 27 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25 篇 工学
    • 15 篇 网络空间安全
    • 14 篇 计算机科学与技术...
    • 5 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 信息与通信工程
    • 1 篇 光学工程
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
  • 3 篇 理学
    • 3 篇 数学
  • 3 篇 军事学
    • 3 篇 军队指挥学

主题

  • 27 篇 key agreement
  • 9 篇 authentication
  • 2 篇 smart card
  • 2 篇 blockchain
  • 2 篇 cryptography
  • 2 篇 pairings
  • 2 篇 network security
  • 1 篇 multi-server
  • 1 篇 implicit key aut...
  • 1 篇 iden-tity-based ...
  • 1 篇 remote desktop p...
  • 1 篇 user anonymity
  • 1 篇 homomorphic encr...
  • 1 篇 simulation
  • 1 篇 mobile network
  • 1 篇 certificate-less...
  • 1 篇 roaming
  • 1 篇 key pre-distribu...
  • 1 篇 unconditional se...
  • 1 篇 attacks

机构

  • 1 篇 school of electr...
  • 1 篇 department of co...
  • 1 篇 guangdong key la...
  • 1 篇 key laboratory o...
  • 1 篇 information secu...
  • 1 篇 low carbon resea...
  • 1 篇 school of comput...
  • 1 篇 school of inform...
  • 1 篇 department of in...
  • 1 篇 department of el...
  • 1 篇 department of in...
  • 1 篇 departmentofcomp...
  • 1 篇 computing center...
  • 1 篇 schoolofinformat...
  • 1 篇 school of comput...
  • 1 篇 school of electr...
  • 1 篇 institute of inf...
  • 1 篇 college of telec...
  • 1 篇 school of mathem...
  • 1 篇 department of co...

作者

  • 2 篇 李明
  • 2 篇 白英彩
  • 2 篇 王勇
  • 2 篇 谷大武
  • 1 篇 xu guoming
  • 1 篇 张欣雨
  • 1 篇 ya-fen chang pei...
  • 1 篇 伍前红
  • 1 篇 zhechong wang
  • 1 篇 sheng-liliu
  • 1 篇 shen jiajun
  • 1 篇 xiu-bo chen
  • 1 篇 程晓明
  • 1 篇 ding chao
  • 1 篇 xia liang
  • 1 篇 c.kamalanathan
  • 1 篇 jiang shaoquan
  • 1 篇 chaoyang li
  • 1 篇 xiaohe wu
  • 1 篇 haoming liu

语言

  • 26 篇 英文
  • 1 篇 中文
检索条件"主题词=Key agreement"
27 条 记 录,以下是1-10 订阅
排序:
Authenticating Tripartite key agreement Protocol with Pairings
收藏 引用
Journal of Computer Science & Technology 2004年 第2期19卷 169-176页
作者: Sheng-LiLiu Fang-GuoZhang Ke-FeiChen DepartmentofComputerScienceandEngineering ShanghaiJiaoTongUniversityShanghai200030P.R.China SchoolofInformationScienceandTechnology ZhongshanUniversityGuangzhou510275P.R.China
In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special si... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Provable Secure ID-Based Explicit Authenticated key agreement Protocol Without Random Oracles
收藏 引用
Journal of Computer Science & Technology 2008年 第5期23卷 832-842页
作者: 田海博 Willy Susilo 明洋 王育民 School of Information Science and Technology Sun Yat-Sen University Guangdong key Laboratory of Information Security Technology Centre for Computer and Information Security Research (CCISR) School of Computer Science and Software Engineering University of Wollongong School of Information Engineering Chang'an University State key Laboratory on ISN Xidian University
In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmatio... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
BC-AKA:Blockchain Based Asymmetric Authentication and key agreement Protocol for Distributed 5G Core Network
收藏 引用
China Communications 2022年 第6期19卷 66-76页
作者: Zhen Gao Dongbin Zhang Jiuzhi Zhang Zhao Liu Haoming Liu Ming Zhao School of Electrical and Information Engineering Tianjin UniversityTianjin 300072China Department of Electronic Engineering Tsinghua UniversityBeijing 100080China Beijing National Research Center for Information Science and Technology Tsinghua UniversityBeijing 100080China
Secure authentication between user equipment and 5G core network is a critical issue for 5G ***,the traditional authentication protocol 5 G-AKA and the centralized key database are at risk of several security problems... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Efficient Certificateless Authenticated key agreement for Blockchain-Enabled Internet of Medical Things
收藏 引用
Computers, Materials & Continua 2023年 第4期75卷 2043-2059页
作者: Chaoyang Li Yanbu Guo Mianxiong Dong Gang Xu Xiu-Bo Chen Jian Li Kaoru Ota College of Software Engineering Zhengzhou University of Light IndustryZhengzhou450002China Department of Sciences and Informatics Muroran Institution of TechnologyMuroran050-8585Japan School of Computing Science and Technology North China University of TechnologyBeijing100144China Information Security Centre State Key Laboratory of Networking and Switching TechnologyBeijing University of Post and TelecommunicationsBeijing100876China
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical *** recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different m... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Improved key agreement Based Kerberos Protocol for M-Health Security
收藏 引用
Computer Systems Science & Engineering 2022年 第8期42卷 577-587页
作者: P.Thirumoorthy K.S.Bhuvaneshwari C.Kamalanathan P.Sunita E.Prabhu S.Maheswaran Department of Computer Science and Engineeirng Nandha Engineering CollegeErode638052India Department of Computer Sceince and Engineering Karpagam College of EngineeringCoimbatore641032India Department of Electrical Electronics and Communication EngineeringGITAM UniversityBengaluru Campus561203India Department of Electronics and Communication Engineering Amrita School of EngineeringCoimbatoreAmrita Vishwa Vidyapeetham641112India Department of Electronics and Communication Engineering Kongu Engineering CollegePerundurai638060India
The development of wireless sensor network with Internet of Things(IoT)predicts various applications in the field of healthcare and cloud *** can give promising results on mobile health care(M-health)and Telecare medi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
ID-based key-insulated Authenticated key agreement Protocol
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2007年 第2期12卷 247-249页
作者: 周渊 程晓明 柴震川 National Computer Network Emergency Response Technical Team/Coordination Center of China Dept.of Computer Science and Eng. Shanghai Jiaotong Univ.
The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity *** with the traditional certificate-based cryptography,identity-based cryptography can eliminate much of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Authenticated key agreement in Group Settings
收藏 引用
Journal of Beijing Institute of Technology 2006年 第2期15卷 186-189页
作者: 李明 王勇 谷大武 白英彩 Department of Computer Science and Engineering Shanghai Jiao Tong University School of Software Beijing Institute of Technology
An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-e... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Pairings-Based Protocol for Group key agreement
收藏 引用
Journal of Beijing Institute of Technology 2005年 第2期14卷 221-224页
作者: 李明 王勇 谷大武 白英彩 Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai200030 China School of Computer Software Beijing Institute of Technology Beijing100081 China Department
An authenticated group key agreement protocol suite (PAGKA) based on pairings is presented in this paper. This suite extends an efficient Diffie-Hellman-based protocol suite by introducing parings on elliptic curves a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient Identity-Based key agreement Protocol in a Multiple PKG Environment
收藏 引用
Wuhan University Journal of Natural Sciences 2014年 第5期19卷 455-460页
作者: ZHOU Huan WANG Xiaofeng SU Jinshu School of Computer National University of Defense Technology National Laboratory for Parallel and Distributed Processing National University of Defense Technology
Identity-based key agreement protocol affords a natural way to combine the participant's identity with its public key. However, most of them just consider the key agreement in a single private key generator (PKG) e... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
EKAES:AN EFFICIENT key agreement AND ENCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS
收藏 引用
Journal of Electronics(China) 2008年 第4期25卷 495-502页
作者: Cheng Hongbing Yang Geng College of Computer Nanjing University of Posts & Telecommunications Nanjing 210003 China College of Information Engineering Jiangsu Radio & TV University Nanjing 210017 China
Wireless sensor networks are being deployed for some practical applications and their se-curity has received considerable *** is an important challenge to find out suitable keyagreement and encryption scheme for wirel... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论