期刊文献+

可证明安全的基于802.11i的漫游认证协议 被引量:3

An 802.11i Robust Security Network Authentication Protocol of Roaming
下载PDF
导出
摘要 随着802.11无线局域网的发展,漫游已经成为它的重要场景.身份认证是保证网络安全的重要措施之一,802.11WLAN中现有的认证协议不能有效地支持漫游.作者提出的基于DH交换的认证协议,不仅满足了漫游对认证协议的特殊要求身份保护和认证时延,而且具有可证明的安全性和必需的安全性质. With the development of 802.11 wireless local area network(WLAN), roaming has become an important scenario. Based on DH exchange, an authentication protocol is proposed.This protocol not only guarantees the confidentiality of user's identity and decreases the roundtrips of the authentication message but also provides provably security and necessary security attributes. As a result the protocol conforms to the requirements for performance and security in roaming scenario of WLAN.
出处 《计算机学报》 EI CSCD 北大核心 2005年第12期2027-2035,共9页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金(2002AA143021) 国家自然科学基金(90204012) 2002教育部优秀青年教师资助计划资助.
关键词 无线局域网 漫游 身份保护 可证明安全 WLAN roaming identity protection provably security
  • 相关文献

参考文献8

  • 1Song B.,Kim K.Two-pass authenticated key agreement protocol with key confirmation.In:Proceedings of Cryptology INDOCRYPT 2000,Lecture Notes in Computer Science 1977.Springer-Verlag,2000,237~249 被引量:1
  • 2Blumental Uri,Buddhikot Milind M.,Garay Juan A.et al.A scheme for authentication and dynamic key exchange in wireless networks.Bell Labs Technical Journal,2002,7(2):37~48 被引量:1
  • 3Aboba B.,Simon D.PPP EAP TLS Authentication Protocol.RFC 2716,1999 被引量:1
  • 4Canetti R.,Krawczyk H.Security analysis of IKE's signaturebased key-exchange protocol.In:Proceedings of the Crypto' 2002,Lecture Notes in Computer Science 2442.Springer-Verlag,2002,143~161 被引量:1
  • 5Canetti R.,Krawczyk H.Analysis of key-exchange protocol and their use for building secure channels.In:Proceedings of Eurocrypt 2001,Lecture Notes in Computer Science 2045.Springer-Verlag,2001,453~474 被引量:1
  • 6Haverinen H.,Salowey J.EAP SIM Authentication.IETF draft-haverinen-pppext eap-sim-16.txt,DEC 2004 被引量:1
  • 7Funk P.,Blake-Wilson S.EAP Tunneled TLS Authentication Protocol(EAP-TTLS).draft-ietf-pppext-eap-ttls-05.txt.July 2004 被引量:1
  • 8Josefsson S.,Palekar A.,Simon D.,Zorn G.Protected EAP Protocol(PEAP).IETF draft-josefsson pppext-eap-tls-eap-10,October 2004 被引量:1

同被引文献11

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部