期刊文献+

普适计算的隐私保护安全协议 被引量:5

A privacy preserving protocol for pervasive computing
下载PDF
导出
摘要 提出了一个用户隐私保护的安全协议.该协议由服务发现者对用户进行认证和盲签名,随后用户以匿名的方式访问服务提供者提供的资源.根据匿名与不可关联性具有紧密的关系,设计了普适计算的匿名攻击模型,通过匿名攻击模型分析可以看出:隐私保护安全协议不仅允许服务提供者对用户的认证,同时也可以保护用户隐私,并且能够防止重放攻击以及设备间的恶意串通. A secure privacy preserving protocol for pervasive computing was presented,in which authentication and blind signature were implemented by service discoverers,and users can access anonymously the resources of service providers.Also this paper addressed an anonymity attack model for pervasive computing that it relied on the closely relationship between anonymity and unlinkability.By analyzing the privacy protection protocol with anonymity attack model,it not only allowed the service providers authenticate us...
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第11期103-105,共3页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 中国博士后基金资助项目(20070410953) 湖北省自然科学基金资助项目(2005ABA243)
关键词 普适计算 隐私 匿名 认证 攻击模型 pervasive computing privacy anonymity authentication attack model
  • 相关文献

参考文献7

  • 1[2]Reiter M,Rubin,A D.Crowds:anonymity for Web transactions[J].ACM Transactions on Information and System Security,1998,1(1):66-92. 被引量:1
  • 2[3]Ren K,Lou W,Kim K,et al.A novel privacy preserving authentication and access control scheme for pervasive computing environments[J].IEEE Transactions on Vehicular Technology,2006,55 (4):1 373-1 384. 被引量:1
  • 3[4]Wu X.Applying pseudonimity for anonymous data delivery in location-aware mobile ad hoc networks[J].IEEE Transactions on Vehicular Technology,2006,55(3):1 062-1 073. 被引量:1
  • 4[5]Kobsa A,Schreck J.Privacy through pseudonymity in user-adaptive systems[J].ACM Transactions on Internet Technology,2003,3(2):149-183. 被引量:1
  • 5[6]Al-Muhtadi J,Campbell R,Kapadia A,et al.Routing through the Mist:privacy preserving communication in ubiquitous computing environments[C]//Proceedings of the International Conference of Distributed Computing Systems (ICDCS 2002).Washington:IEEE Computer Society Press,2002:74-83. 被引量:1
  • 6郭亚军,洪帆,叶俊民,邱珊珊,宋建华,洪亮.普适计算的信任认证[J].计算机科学,2006,33(8):92-94. 被引量:3
  • 7洪帆,郭亚军.资源限制信任协商[J].华中科技大学学报(自然科学版),2006,34(5):23-25. 被引量:7

二级参考文献18

  • 1肖道举,郭杰,陈晓苏.一种对中间人攻击的防范策略的研究[J].计算机工程与科学,2004,26(9):7-8. 被引量:3
  • 2Winslett M,Yu T,Seamons K,et al.Trust negotiation on the Web[J].IEEE Internet Computing,2002,6(6):30-37. 被引量:1
  • 3Hess A,Holt J,Jacobson J,et al.Content-triggered trust negotiation[J].ACM Transactions on Information and System Security,2004,7(3):428-456. 被引量:1
  • 4Yu T,Winslett M,Seamons K E.Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation[J].ACM Transactions on Information and System Security,2003,6(1):1-42. 被引量:1
  • 5Kagal L, Finin T, Joshi A. Trust-based security in pervasive computing environments. IEEE Computer, 2001, 34 (12) : 154-157 被引量:1
  • 6Winslett M, Yu T, Seamons K, Hess A, Jacobson J, Jarvis R,Smith B, Yu L. Trust negotiation on the Web. IEEE Internet Computing, 2002, 6(6): 30-37 被引量:1
  • 7Hess A, Jacobson J, Mills H, Wamsley R, Seamons K E,Smith B. Advanced client/server authentication in TLS. Network and Distributed System Security Symposium, San Diego, California,Feb. 2002 被引量:1
  • 8Balfanz D, Smetters D K, Stewart P, Wong H C. Talking to strangers: authentication in Ad-hoc wireless networks. In: the 9th Annual Network and Distributed System Security Symposium. San Diego, California, Feb. 2002 被引量:1
  • 9Kohl J, Neuman S. The kerberos network authentication service.IEIF RFC 1510, 1993 被引量:1
  • 10Pirzada A A, McDonald C. Kerberos assisted authentication in mobile Ad-hoc networks. In.. Castro EV,ed. the 27th Conference on Australasian Computer Science. Dunedin, New Zealand,2004, 26:41-46 被引量:1

共引文献8

同被引文献73

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部