期刊文献+

网络认证技术新发展 被引量:4

The State of the Art of Authentication Technology
下载PDF
导出
摘要 文章分析了身份认证的必要性和发展现况,详细介绍了常见实体认证手段和基于密码学认证协议。随着移动通信的迅猛发展,身份认证和认证协议都出现许多研究热点。在HMAC算法的基础上还提出了一种改进认证协议,可以有效防止消息的重传。 This paper analyzes the necessity of network authentication.The state of the art of network authentication and research focus is introduced.The entity authentication and message authentication protocol are described in detail.As therapid development of mobile communication,some research focuses come forth.It proposes an improved protocol based on HMAC algorithm that can effectively pretend from message replaying.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第36期17-19,51,共4页 Computer Engineering and Applications
基金 国家863高技术研究发展计划项目资助(编号:2002AA143041) 国家973基础研究规划项目资助(编号:G1999035804) 国家自然科学基金项目资助(批准号:60073049)
关键词 网络攻击 身份认证 网络认证 网络通信 密码学 计算机网络 网络安全 Entity authentication,Authentication protocol,Biometrics authentication
  • 相关文献

参考文献10

  • 1[1]W Stallings. Network and Internetwork Security,Principles and Practice[M].New Jersey:Prentice-Hall,Inc, 1995 被引量:1
  • 2[2]D Brown.Techniques for privacy and authentication in personal communication systems. IEEE Personal Communications, 1995-08:6~10 被引量:1
  • 3[3]M J Beller,L F Chang,Y Yacobi.Privacy and authentication on a portable communications system[C].In:IEEE Globecom91 ,Conf Record,Phoenix, 1991-12:1922~1927 被引量:1
  • 4[4]J L Dugelay,J C Junqua,R Kuhn. Recent advances in biometric person authentication. Proceedings[C].In:ICASSP 02,IEEE International Conference on, 2002; 14:13~ 17 被引量:1
  • 5[5]Techniques and E-Commerce American Bankers Association. Keyed Hash Message Authentication Code. ANSIX9.71 ,Washington D C,2000 被引量:1
  • 6[6]Fiat A,Shamir,A.How to Prove Yourself:Practical Solutions to [dentification and Signature Problems[C].In:Cryptology-Crypto86, SpringerVerlag, 1987:186~194 被引量:1
  • 7[7]Dan Brown.Techniques For Privacy and Authentication in Personal Communication systems[J].IEEE Personal Communications, 1995; 2 (4):6~10 被引量:1
  • 8[8]L Lamport. Password authentication with insecure communication[J].Communications of the ACM,1981 ;24:770~772 被引量:1
  • 9[9]Rigney C,Rubens A,Simpson W et al. Remote Authentication Dial In Service (RADIUS) [S].RFC2138,2000-04 被引量:1
  • 10[10]Perrig A,Song D,Hash Visualization.A New Technique to Improve Real-World Security[C].In:Proceedings of the 1999 International Workshop on Cryptographic,1999 被引量:1

同被引文献18

  • 1王同洋,李敏,吴俊军.基于多因素的网络身份认证[J].计算机应用与软件,2005,22(6):100-103. 被引量:7
  • 2常潘,沈富可.基于LDAP的校园网统一身份认证的实现[J].计算机工程,2007,33(5):281-282. 被引量:46
  • 3BOLLE R M, CONNEL J H,RATHA N K. Biometric perils and patches [ J ]. Pattern Recognition ,2002,35 ( 12 ) :2727- 2738. 被引量:1
  • 4ULUDAG U,PANKANTI S, PRABHAKAR S,et al. Biometric cryptosystems: issues and challenges [ C ]//Proc of 1EEE Conference on Multimedia Information Retrieval. [ S. l. ] :IEEE Press,2004. 被引量:1
  • 5TURK M, PENTLAND A. Eigenfaces for face detection/recognition [ J]. Joumal of Cognitive Neuroscience, 1991,3( 1 ) : 71-86. 被引量:1
  • 6TEOH A B J,NGO D C L,GOH A. Finger hashing:two factor authentication featuring fingerprint data and tokenized random number[ J ]. Pattern Recognition ,2004,37(6) :2245-2255. 被引量:1
  • 7Face database[ EB/OL]. http://www, cl. cam. ac. uk/research/dtg/ attarchive/facedatabase, htmt. 被引量:1
  • 8KONG A, CHEUNG K H ,ZHANG D,et al. An analysis of biohashing and its variants[ J]. Pattern Recognition ,2006,39(7) :1359-1368. 被引量:1
  • 9BHARGAV-SPANTZEL, SQUICCIARINI A, MODI S, et al. Privacy perserving muhi-factor authentication with biometrics[ J]. Journal of Computer Security,2007,15(5 ) :529-560. 被引量:1
  • 10MICHAEL DONNELLY. An Introduction to LDAP [EB/OL]. http://dapman. orn/rticles/ intro-to-ldap, html.访问时间[h] :2008-01-12. 被引量:1

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部