24小时热门版块排行榜    

查看: 143  |  回复: 2
本帖产生 1 个 ,点击这里进行查看

zhuhf

禁虫 (正式写手)

本帖内容被屏蔽

已阅   关注TA 给TA发消息 送TA红花 TA的回帖
回帖置顶 ( 共有1个 )

baiyuefei

版主 (文学泰斗)

风雪

优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主优秀版主优秀版主

【答案】应助回帖

Accession number:


20155201712893
3楼2016-03-27 09:30:35
已阅   关注TA 给TA发消息 送TA红花 TA的回帖
普通回帖

baiyuefei

版主 (文学泰斗)

风雪

优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主优秀版主优秀版主

【答案】应助回帖

★ ★ ★ ★ ★
感谢参与,应助指数 +1
zhuhf: 金币+5, ★★★★★最佳答案 2016-03-27 09:54:18
心静_依然: LS-EPI+1, 感谢应助 2016-03-27 10:08:27
Accession number:


20155201712893






Title:

A multi-server authenticated key agreement protocol with privacy preserving based on chaotic maps in random oracle model






Authors:

Zhu, Hongfeng1 ; Zhu, Dan2 ; Zhang, Yan3





Author affiliation:

1Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang, China






2School of Foreign Languages, Shenyang Jianzhu University, No.9, HunNan East Street, HunNan District, Shenyang, China






3Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang, China






Source title:

Journal of Information Hiding and Multimedia Signal Processing






Abbreviated source title:

J. Inf. Hiding Multimedia Signal Proces.






Volume:

7






Issue:

1






Issue date:

January 2016






Publication year:

2016






Pages:

59-71






Language:

English






ISSN:

20734212






E-ISSN:

20734239






Document type:

Journal article (JA)






Publisher:

Ubiquitous International






Abstract:

In the research literature, a typical authenticated key agreement protocol is designed to realize mutual authentication and key secrecy. In a network, as a crucial cryptographic primitive, key agreement can establish secure communication channels for communication entities. Meanwhile, the users privacy is particularity important, especially for multi-server authentication environment. Network privacy security means that the personal data and online data are not peep, intrusion, interference, illegal collection and utilization. In our paper, we propose a robust chaotic maps-based authentication key agreement scheme with privacy protection using smart cards for multi-server authentication environment. The key idea of our proposed scheme is to adopt chaotic maps for mutual authentication, not to encrypt/decrypt messages transferred between user and server, which can make our proposed scheme much more efficient. In addition, our protocol can realize the users privacy preserving and various common security features. As a whole, compared with other related protocol, our proposed protocol is more secure and practical. © 2016.






Number of references:

19






Main heading:

Data privacy






Controlled terms:

Authentication - Biometrics - Chaotic systems - Cryptography - Lyapunov methods - Network architecture - Network security - Public key cryptography - Smart cards - Transportation






Uncontrolled terms:

Authenticated key agreement protocols - Authentication key agreement - Chaotic map - Communication entities - Cryptographic primitives - Multi-server - Mutual authentication - Privacy preserving






Classification code:

461 Bioengineering and Biology - 722.4 Digital Computers and Systems - 723 Computer Software, Data Handling and Applications - 961 Systems Science






Database:

Compendex






Compilation and indexing terms, © 2016 Elsevier Inc.



Full-text and Local Holdings Links
2楼2016-03-27 09:29:57
已阅   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 zhuhf 的主题更新
信息提示
请填处理意见