Advanced Search
Volume 29 Issue 1
Jan.  2011
Turn off MathJax
Article Contents
YAO Zhiqiang, LI Guanglong, WANG Shiguo, YOU Zhihong. Compressed Sensing Channel Estimation Algorithm Based on Deterministic Sensing with Golay Complementary Sequences[J]. Journal of Electronics & Information Technology, 2016, 38(2): 282-287. doi: 10.11999/JEIT150594
Citation: Wang Quan-lai, Han Ji-hong, Wang Ya-di . Design and Analysis of an Authentication Protocol for Digital Mobile Communication System[J]. Journal of Electronics & Information Technology, 2007, 29(1): 189-192. doi: 10.3724/SP.J.1146.2005.00346

Design and Analysis of an Authentication Protocol for Digital Mobile Communication System

doi: 10.3724/SP.J.1146.2005.00346
  • Received Date: 2005-03-28
  • Rev Recd Date: 2006-04-10
  • Publish Date: 2007-01-19
  • This paper designs a communion key distribution protocol based on asymmetric cipher system, and an authentication protocol based on symmetric cipher system for the requirement of digital mobile communication system. Then this protocol is analyzed by using the Spi calculus and its security is proved.
  • [1] Boyd C and Mathuria A. Protocols for Authentication and Key Establishment. Springer, 2003: 33-72. [2] Basyouni A. Analysis of wireless cryptographic protocols. [Master thesis].[J].Kingson, Ontario, Queens University, Canada.1997,:- [3] Mu Y and Varadharajan V. On the design of security for mobile communications. ACISP96, Australia, 1996: 134-145. [4] Brown D. Techniques for privacy and authentication in personal communication systems. IEEE Personal Communications, 1995, 2(4): 6-10. [5] Mao WenBo. Modern Cryptography: Theory and Practice(英文版). 北京: 电子工业出版社. Beijing: Publishing House of Electronics Industry, 2004: 367-382. [6] Burrows M, Abadi M, and Needham R. A logic of authentication[J].Proceedings of the Royal Society of London A.1989, 426(1871):233-271 [7] Abadi M and Gordon A. A calculus for cryptographic protocols: The Spi calculus[J].Journal of Information and Computation.1999, 148(1):1-70 [8] Milner R, Parrow J, and Walker D. A calculus for mobile processes, part I/II[J].Journal of Information and Communication.1992, 100(1):1-77 [9] Blanchet B. From secrecy to authenticity in security protocols[J].Proceedings of SAS0.2002, LNCS 2477:342-359
  • Cited by

    Periodical cited type(3)

    1. 谢文旺,孙云莲. 基于OS-ELM的宽带电力线通信解映射优化算法. 电测与仪表. 2019(13): 1-6+50 .
    2. 刘远航,刘晓彤,彭帅,万晋京. 基于二进制粒子群算法的OFDM稀疏信道导频优化. 重庆邮电大学学报(自然科学版). 2017(03): 335-340 .
    3. 姜敏敏. 一种噪声环境下超宽带冲激信号稀疏重构方法. 南京邮电大学学报(自然科学版). 2017(05): 29-33 .

    Other cited types(13)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2997) PDF downloads(834) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return