English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4243239      Online Users : 728
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/22526


    Title: Integrated authentications based on identities??
    Authors: Lin, Chu-Hsing, Wang, Ching-Te
    Contributors: Department of Computer Science, Tunghai University
    Keywords: Algorithms;Computational complexity;Cryptography;Network protocols;Security of data;Telecommunication networks
    Date: 1996-10-02
    Issue Date: 2013-05-21T09:09:04Z (UTC)
    Publisher: Lexington, KY, USA
    Abstract: In this paper, integrated entity authentication schemes based on the identity numbers of users will be proposed. Entity authentication can be considered as a protection mechanism which prevent the forged entity to impersonate the legal entity or to fool other entities in a communication network. Basically, enciphering methods may be applied for the purpose of authenticity. After two entities have authenticated each other mutually, by using two-way verifying procedures, the shared session key will thus be generated. Moreover, authentication schemes from three aspects of public-key or private-key methods, public-key ID-based methods, and ID-based methods are also investigated. Offensive actions such as parallel session attacks, interleaving attacks, and middle person relay attacks, to the presented schemes will be resisted. Further, computational and space complexities, transmission efficiency, and security level will also be analyzed.
    Relation: IEEE Annual International Carnahan Conference on Security Technology, Proceedings , pp. 37-41
    Appears in Collections:[資訊工程學系所] 會議論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML217View/Open


    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback