咨询与建议

限定检索结果

文献类型

  • 16 篇 期刊文献

馆藏范围

  • 16 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 12 篇 网络空间安全
    • 4 篇 计算机科学与技术...
    • 3 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
  • 8 篇 军事学
    • 8 篇 军队指挥学
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 16 篇 key exchange
  • 5 篇 provable securit...
  • 3 篇 password
  • 2 篇 authentication
  • 2 篇 security
  • 2 篇 digital signatur...
  • 2 篇 cryptography
  • 2 篇 dictionary attac...
  • 1 篇 standard model
  • 1 篇 anonymous passwo...
  • 1 篇 three-party auth...
  • 1 篇 tensor decomposi...
  • 1 篇 wireless mesh ne...
  • 1 篇 three-party
  • 1 篇 protocol
  • 1 篇 mobile-commerce ...
  • 1 篇 ke-based encrypt...
  • 1 篇 mobile applicati...
  • 1 篇 secure communica...
  • 1 篇 verifier

机构

  • 2 篇 state key labora...
  • 1 篇 institute of sci...
  • 1 篇 school of comput...
  • 1 篇 informationsecur...
  • 1 篇 state key labora...
  • 1 篇 computer school ...
  • 1 篇 engineering univ...
  • 1 篇 department of ap...
  • 1 篇 state key labora...
  • 1 篇 trusted computin...
  • 1 篇 school of comput...
  • 1 篇 infor
  • 1 篇 school of comput...
  • 1 篇 state key labora...
  • 1 篇 department of in...
  • 1 篇 state key labora...
  • 1 篇 school of inform...
  • 1 篇 school of mathem...
  • 1 篇 department of co...
  • 1 篇 zijin college na...

作者

  • 1 篇 2 graduate unive...
  • 1 篇 shunbo xiang
  • 1 篇 chunsheng gu
  • 1 篇 gu dawu
  • 1 篇 jiang zhang
  • 1 篇 ma jianfeng
  • 1 篇 王立斌
  • 1 篇 xuan wang
  • 1 篇 ke chen
  • 1 篇 潘嘉昕
  • 1 篇 shaowu mao
  • 1 篇 qingfeng cheng
  • 1 篇 ruijie zhang
  • 1 篇 le fulong
  • 1 篇 kuo-yu tsai
  • 1 篇 lizi-chen
  • 1 篇 li zi-chen li zh...
  • 1 篇 ding xuyang fan ...
  • 1 篇 deng miaolei
  • 1 篇 lizhong-xian

语言

  • 15 篇 英文
  • 1 篇 中文
检索条件"主题词=key exchange"
16 条 记 录,以下是1-10 订阅
排序:
Universally composable anonymous password authenticated key exchange
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 153-168页
作者: Xuexian HU Jiang ZHANG Zhenfeng ZHANG Jing XU Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences State key Laboratory of Mathematical Engineering and Advanced Computing Science and Technology on Information Assurance Laboratory State key Laboratory of Cryptology
Anonymous password authenticated key exchange(APAKE) is an important cryptographic primitive, through which a client holding a password can establish a session key with a server both authentically and anonymously. Alt... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model
收藏 引用
Science China(Information Sciences) 2017年 第7期60卷 130-143页
作者: Fushan WEI Jianfeng MA Ruijie ZHANG Chuangui MA Xuan WANG State key Laboratory of Integrated Service Networks Xidian University State key Laboratory of Mathematical Engineering and Advanced Computing The PLA Information Engineering University Engineering University of CAPF
With the assistance of an authentication server, a gateway-oriented password-authenticated key exchange(GPAKE) protocol can establish a common session key shared between a client and a gateway. Unfortunately, a GPAKE ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Efficient and secure three-party authenticated key exchange protocol for mobile environments
收藏 引用
Journal of Zhejiang University-Science C(Computers and Electronics) 2013年 第5期14卷 347-355页
作者: Chih-ho CHOU Kuo-yu TSAI Tzong-chen WU Kuo-hui YEH Department of Information Management National Taiwan University of Science and Technology Department of Management Information Systems Hwa Hsia Institute of Technology Department of Information Management National Dong Hwa University
Yang and Chang (2009) proposed a three-party authenticated key exchange protocol for securing communications in mobile-commerce environments. Their protocol reduces computation and communication costs by employing ell... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of key exchange Protocol Based on Tensor Ergodic Problem
收藏 引用
China Communications 2018年 第10期15卷 172-181页
作者: Chunsheng Gu Youyu Gu Peizhong Shi Chunpeng Ge Zhenjun Jing School of Computer Engineering Jiangsu University of Technology State key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Mathematics Hefei University of Technology
Recently, Mao, Zhang, Wu et al. constructed two key exchange(KE) protocols based on tensor ergodic problem(TEP). Although they conjectured that these constructions can potentially resist quantum computing attack, they... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Universally Composable Three Party Password-based key exchange Protocol
收藏 引用
China Communications 2009年 第3期6卷 150-155页
作者: Deng Miaolei Ma Jianfeng Le Fulong School of Computer Xidian University Xi'an 710071 China Institute of Science Information Engineering University Zhengzhou 450001 China
Within the framework of universal composability,an appropriate ideal functionality that captures the basic security requirements of three party password-based key exchange was defined. An efficient real-word three par... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment
收藏 引用
Science China(Information Sciences) 2021年 第9期64卷 249-251页
作者: Ting CHEN Xinghua LI Qingfeng CHENG School of Cyber Engineering Xidian University State key Laboratory of Mathematical Engineering and Advanced Computing
Dear editor,Numerous three-party authenticated key exchange(3 PAKE)protocols have been presented, which allow the establishment of a secure session by utilizing a session key shared between two clients with the assist... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
CMQV+:An authenticated key exchange protocol from CMQV
收藏 引用
Science China(Information Sciences) 2012年 第7期55卷 1666-1674页
作者: LI Hui 1,2 & WU ChuanKun 1 1 State key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China 2 Graduate University of Chinese Academy of Sciences,Beijing 100049,China State key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China Graduate University of Chinese Academy of Sciences Beijing China
Ustaoglu presents a secure and efficient key exchange protocol named CMQV,based on the design rationales of HMQV and *** with the latter two protocols,on one hand,CMQV achieves high performance of HMQV,and on the othe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Simple and Efficient Password-Based Authenticated key exchange Protocol
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2011年 第4期16卷 459-465页
作者: 王立斌 潘嘉昕 马昌社 School of Computer South China Normal University
Password-based authenticated key exchange(PAKE) protocols are cryptographic primitives which enable two entities,who only share a memorable password,to identify each other and to communicate over a public unreliable n... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Modified Harn Authentication key exchange Scheme
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2000年 第1期7卷 75-77页
作者: LIZi-chen LIZhong-xian InformationSecurityCenter BeijingUniversityofPostsandTelecommunicationsBeijing100876P.R.China Infor
Recently, Harn proposed one digital signature scheme for Diffie-Hellman key exchange system. In this paper, we point out at first that there is a weakness in Harn's system and then we propose two modified schemes to a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Security Patch for a Three-Party key exchange Protocol
收藏 引用
Wuhan University Journal of Natural Sciences 2010年 第3期15卷 242-246页
作者: ZHAO Jianjie GU Dawu School of Information Security Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论