期刊文献+

无线通信网络中基于信息流向的多域安全机制 被引量:1

在线阅读 下载PDF
导出
摘要 介绍了一种新的以信息的流向为分析对象,根据信息论和通信协议体系中信息的运动方向,构建保证无线通信网络中信息可靠、安全到达的安全机制——多域安全机制。具体论述了该方法的基本思路、方法和内容。
作者 余艳英 朱江
出处 《数字通信》 2011年第4期39-43,共5页 Digital Communications and Networks
基金 国家自然科学基金资助课题(编号:61071116)
作者简介 余艳英(1978-)女,硕士,主要研究方向为无线通信网络安全,E-mail:yuyy@cqupt.edu.cn; 朱江(1977-)男,博士,主要研究方向为无线通信网络安全,E-mail:zhu-jiang@cqupt.edu。cn。
  • 相关文献

参考文献11

  • 1DAHLBERG T, MALLAT N, ONDRUS J, et al. Past, present and future of mobile payments research : A literature review [ J]. Electronic Commerce Research and Applications, 2008, 7(2): 165-181.
  • 2HWANG R, SHIAUA S, JANA D. A new mobile payment scheme for roaming services [ J]. Electronic Commerce Research and Applications, 2007, 6 (2):184-191.
  • 3KIM E, KONG M, YI J. Providing secure mobile device pairing based on visual continuation[ EB/OL]. (2009-05- 25 ) [ 2011-04-20 ]. http ://ieeexplore. ieee. org/xpls/abs _all. jsp? anaumber = 5157021tag = 1.
  • 4HASSINEN M, HYPPONEN K, TRICHINA E. Utilizing national public-key infrastructure in mobile payment systems [ J]. Electronic Commerce Research and Applications, 2008, 7(2): 214-231.
  • 5侯惠芳,刘光强,季新生,张秋闻.基于公钥的可证明安全的异构无线网络认证方案[J].电子与信息学报,2009,31(10):2385-2391. 被引量:13
  • 6MANULIS M, LEROY D, KOEUNE F. Authenticated wireless roaming via tunnels : making mobile guests feel at home[ EB/OL]. ( 2009-03-10 ) [ 2011-04-20 ]. http: // www. crypo, informatik tu-darmstadt, de/assets/PublicatimVMalekoBoQuASIACCS09, pdf.
  • 7SIMON D, ABOBA B, HURST R. The EAP-TLS authentication protocol [ EB/OL ]. ( 2008-03-19 ) [ 2011-04-21 ]. http : tools, ietf. org/html/rfc5216.
  • 8PENG H X. An identity-based authentication model for multi-domain [ EB/OL ]. ( 2008-05-14 ) [ 2011-04-201. http:www, hpi. uni-potsdam, de/mcine/team/chcng, html.
  • 9ZHANG G, CHENG F,MEINELL C. Towards secure mobile payment based on SIP [ EB/OL]. (2008-05-14) [ 2011-04-20 ]. http: www. hpi. uni-potsdam, de/meine/ tearn/cheng, html.
  • 10LU H, CLARET F, CHRIS R, CHATWIN, et al. An agent-oriented mobile payment ystem secured using a bio- metrics approach [ J]. International Journal of Agent-Oriented Software Engineering. 2009, 3 (2-3) : 163-187.

二级参考文献8

  • 1彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 2Simon D, Aboba B, and Hurst R. The EAP-TLS authentication protocol. RFC 5216, IETF, 2008.
  • 3Manulis M, Leroy D, and Koeune F. Authenticated wireless roaming via tunnels: making mobile guests feel at home. http://eprint.iacr.org/2008/382. pdf, 2008.
  • 4Vivek K and Vivek S A. Elliptic curve cryptography[C]. www.acm.org/ubiquity/volume_ 9/pf/v9i20_singh.pdf. ACM Ubiquity, 2008.
  • 5Canetti R and Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels (Full Version), http://eprint.iacr.org. 2001.
  • 6Bellare M, Canetti R, and Krawczyk H. A modular approach to the design and analysis of authentication and key exchange protocols[C]. Proceedings of the 30th ACM Symposium on Theory of Computing, Dallas, 1998: 419-428.
  • 7Tin Y S T, Vasanta H, Boyd C, and Nieto J M G. Protocols with security proofs for mobile applications[C]. Proceedings of the ACISP 2004, Sydney, July. 13-15, 2004: 358-369.
  • 8Tin Y S T, Boyd C, and Nieto J G. Provably secure key exchange: an engineering approach[C]. Proceedings of the Australasian Information Security Workshop (AISW2003), Australasian, 2003: 97-104.

共引文献12

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部