期刊文献+

混合密码认证模型的研究 被引量:11

A Hybrid Encryption Model for Authentication
下载PDF
导出
摘要 随着网络技术的发展,人们在享受开放性便利的同时也受到网络安全问题的威胁,身份认证是保证网络安全的重要措施之一,传统对称密码体制和非对称密码体制认证方式各有其优缺点.该文提出一种混合密码认证模型(Hybrid Encryption Model for Authentification,HEMA),具有明显优于两种传统体制的特点.HEMA模型可以广泛应用于开放性网络应用技术,如移动代理和多代理的安全保障体系以及其它需要用户身份认证的场合.该文还给出了该模型的结构和实验系统的实现. With the rapid development of network techniques, people are enjoying the advantage brought by the opening of network. At the same time they are suffering security problems. Authentication is the first step to achieve security. There are two typical models of authentication, which are based on the technology of symmetric and asymmetric encryption respectively. In this paper a new model-HEMA(a Hybrid Encryption Model for Authentication) is issued, which encompasses all the virtues of typical models of authentication. HEMA is able to be applied in many sorts of open network technologies such as mobile agents and multi-agents systems to keep them safe and other occasions which need user to affirm their identities. Furthermore, the architecture of the model and the implementation of experiment system are given.
出处 《计算机学报》 EI CSCD 北大核心 2002年第11期1144-1148,共5页 Chinese Journal of Computers
基金 本课题得到国家自然科学基金(60173037) 江苏省自然科学基金(BK2001123)资助.
关键词 混合密码认证模型 网络安全 认证 混合密码体制 计算机网络 数据加密 network security, authentication, hybrid encryption
  • 相关文献

参考文献3

二级参考文献1

共引文献1

同被引文献45

  • 1Chess D.security Issues in Mobile Code Systems[C].In:Giovanni Vigna ed.Mobile Agent Security,LNCS 1419,Springer, 1998:1~14 被引量:1
  • 2N M Karnik,A R Tripathi.Design Issues in Mobile Agent Programming Systems. IEEE Concurrency,1998;6(3):52~61 被引量:1
  • 3UWE G WILHELM,SEBASTIAN M STAAMANN,LEVENTE BUTTYAN.A Pessimistic Approach to Trust in Mobile Agent Platforms[J].IEEE COMPUTING, 2000-09: 40~48 被引量:1
  • 4Martin Schaaf,Frank Maure. Integrating Java and CORBA:A Programmer's Perspective[J].IEEE INTERNET COMPUTING,2001-01:72~78 被引量:1
  • 5Wang X F,Yi X,Lam K Y.Secure Information Agent for Intemet Trading[C].In:11th Australian Joint Conference on Artificial Intelligence'98, Brisban, Australia: Springer-Verlag Publishers, 1998; 1544:183~194 被引量:1
  • 6Diffie W., Hellman M.E..New directions in cryptography. IEEE Transactions on Information Theory,1976,22(6):644~654 被引量:1
  • 7Burrows M., Abadi M., Needham R.. A logic of authentication.Digital Systems Research Center,Technical Report 39,1989 被引量:1
  • 8Schneier B.. Applied Cryptography: Protocols, Algorithms, and Source Code in C. second edition. New York: John Wiley & Sons, 1996 被引量:1
  • 9Boyko V., MacKenzie P., Patel S.. Provably secure password-authenticated key exchange using Diffie-Hellman. In: Proceedings of EUROCRYPT 2000, Berlin Heidelberg, volume 1807 of LNCS. 2000, 156~171 被引量:1
  • 10Nicola R D,Ferrari G,Pugliese R.KLAIM:A Kernel Language for Agents Interaction and Mobility.IEEE Transactions on Software Engineering.1998;24(5):315~330. 被引量:1

引证文献11

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部