高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

数字移动通信系统中认证协议的设计与分析

王全来 韩继红 王亚弟

王全来, 韩继红, 王亚弟. 数字移动通信系统中认证协议的设计与分析[J]. 电子与信息学报, 2007, 29(1): 189-192. doi: 10.3724/SP.J.1146.2005.00346
引用本文: 王全来, 韩继红, 王亚弟. 数字移动通信系统中认证协议的设计与分析[J]. 电子与信息学报, 2007, 29(1): 189-192. doi: 10.3724/SP.J.1146.2005.00346
Wang Quan-lai, Han Ji-hong, Wang Ya-di . Design and Analysis of an Authentication Protocol for Digital Mobile Communication System[J]. Journal of Electronics & Information Technology, 2007, 29(1): 189-192. doi: 10.3724/SP.J.1146.2005.00346
Citation: Wang Quan-lai, Han Ji-hong, Wang Ya-di . Design and Analysis of an Authentication Protocol for Digital Mobile Communication System[J]. Journal of Electronics & Information Technology, 2007, 29(1): 189-192. doi: 10.3724/SP.J.1146.2005.00346

数字移动通信系统中认证协议的设计与分析

doi: 10.3724/SP.J.1146.2005.00346

Design and Analysis of an Authentication Protocol for Digital Mobile Communication System

  • 摘要: 该文针对数字移动通信系统的背景和需求, 基于公钥密码体制设计了一个端端密钥分发协议,基于对称密码体制设计了一个身份认证协议,并利用Spi演算对身份认证协议进行了分析,证明了其安全性。
  • [1] Boyd C and Mathuria A. Protocols for Authentication and Key Establishment. Springer, 2003: 33-72. [2] Basyouni A. Analysis of wireless cryptographic protocols. [Master thesis].[J].Kingson, Ontario, Queens University, Canada.1997,:- [3] Mu Y and Varadharajan V. On the design of security for mobile communications. ACISP96, Australia, 1996: 134-145. [4] Brown D. Techniques for privacy and authentication in personal communication systems. IEEE Personal Communications, 1995, 2(4): 6-10. [5] Mao WenBo. Modern Cryptography: Theory and Practice(英文版). 北京: 电子工业出版社. Beijing: Publishing House of Electronics Industry, 2004: 367-382. [6] Burrows M, Abadi M, and Needham R. A logic of authentication[J].Proceedings of the Royal Society of London A.1989, 426(1871):233-271 [7] Abadi M and Gordon A. A calculus for cryptographic protocols: The Spi calculus[J].Journal of Information and Computation.1999, 148(1):1-70 [8] Milner R, Parrow J, and Walker D. A calculus for mobile processes, part I/II[J].Journal of Information and Communication.1992, 100(1):1-77 [9] Blanchet B. From secrecy to authenticity in security protocols[J].Proceedings of SAS0.2002, LNCS 2477:342-359
  • 加载中
计量
  • 文章访问数:  2951
  • HTML全文浏览量:  98
  • PDF下载量:  834
  • 被引次数: 0
出版历程
  • 收稿日期:  2005-03-28
  • 修回日期:  2006-04-10
  • 刊出日期:  2007-01-19

目录

    /

    返回文章
    返回