24小时热门版块排行榜    

查看: 190  |  回复: 2
本帖产生 1 个 ,点击这里进行查看

zhuhf

禁虫 (正式写手)

本帖内容被屏蔽

已阅   关注TA 给TA发消息 送TA红花 TA的回帖
回帖置顶 ( 共有1个 )

baiyuefei

版主 (文学泰斗)

风雪

优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主优秀版主优秀版主

【答案】应助回帖

Accession number:       
20154701571362
3楼2016-03-28 08:17:46
已阅   关注TA 给TA发消息 送TA红花 TA的回帖
普通回帖

baiyuefei

版主 (文学泰斗)

风雪

优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主优秀版主优秀版主

【答案】应助回帖

★ ★ ★ ★ ★ ★
感谢参与,应助指数 +1
zhuhf: 金币+6, ★★★★★最佳答案 2016-03-28 15:28:39
lazy锦溪: LS-EPI+1, 感谢应助! 2016-03-28 16:54:15
ccession number:       
20154701571362
        Title:        Password-authenticated key exchange scheme using chaotic maps towards a new architecture in standard model
        Authors:         Zhu, Hongfeng1 Email author zhuhongfeng1978.163.com@qq.com; Zhang, Yifeng1; Xia, Yu1; Li, Haiyang1
        Author affiliation:        1 Software College, Shenyang Normal University, no. 253, HuangHe Bei Street, HuangGu District, Shenyang, China
        Corresponding author:         Zhu, Hongfeng (zhuhongfeng1978.163.com@qq.com)
        Source title:        International Journal of Network Security
        Abbreviated source title:        Int. J. Netw. Secur.
        Volume:        18
        Issue:        2
        Issue date:        2016
        Publication year:        2016
        Pages:        326-334
        Language:        English
        ISSN:         1816353X
        E-ISSN:         18163548
        Document type:        Journal article (JA)
        Publisher:        Femto Technique Co., Ltd.
        Abstract:        Nowadays, the overwhelming majority of password-authenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four security models (heuristic security, random oracle, ideal cipher and standard model). However, with rapid changes in the modern communication environment such as wireless mesh networks and cloud storing, it is necessary to put forward a kind more flexible and general architecture to adapt it. So, in our paper, we firstly propose a provable secure password authenticated key agreement protocol using chaotic maps towards multiple servers to server architecture in the standard model. The multiple servers to server architecture will solve the problems single-point of security, single-point of efficiency and single-point of failure in the centralized registration center towards multi-server architecture. The new protocol resists dictionary attacks mounted by either passive or active network intruders, allowing, in principle, even weak password phrases to be used safely. It also offers perfect forward secrecy, which protects past sessions and passwords against future compromises. Finally, we give the security proof in the standard model and the efficiency analysis of our proposed scheme.
        Number of references:        25
        Main heading:         Network architecture
        Controlled terms:         Authentication - Chaotic systems - Cryptography - Efficiency - Lyapunov methods - MESH networking - Public key cryptography
        Uncontrolled terms:         Chaotic map - Communication environments - Key exchange - Multi-server architecture - Multiple servers - Mutual authentication - Password-authenticated key agreement - Password-authenticated key exchange
        Classification code:         722 Computer Systems and Equipment - 723 Computer Software, Data Handling and Applications - 913.1 Production Engineering - 961 Systems Science
        Database:        Compendex
                Compilation and indexing terms, © 2016 Elsevier Inc.
2楼2016-03-28 08:17:34
已阅   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 zhuhf 的主题更新
信息提示
请填处理意见