²é¿´: 353  |  »Ø¸´: 1
±¾Ìû²úÉú 1 ¸ö £¬µã»÷ÕâÀï½øÐв鿴

zhuhf

½û³æ (ÕýʽдÊÖ)

±¾ÌûÄÚÈݱ»ÆÁ±Î

» ²ÂÄãϲ»¶

ÒÑÔÄ   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

baiyuefei

°æÖ÷ (ÎÄѧ̩¶·)

·çÑ©

ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÎÄÏ׽ܳö¹±Ï×ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÎÄÏ׽ܳö¹±Ï×ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÎÄÏ׽ܳö¹±Ï×ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷

¡¾´ð°¸¡¿Ó¦Öú»ØÌû

¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï
¸Ðл²ÎÓ룬ӦÖúÖ¸Êý +1
zhuhf: ½ð±Ò+10, ¡ï¡ï¡ï¡ï¡ï×î¼Ñ´ð°¸ 2017-03-23 06:28:28
lazy½õϪ: LS-EPI+1 2017-03-23 08:35:17
Accession number:       
20171003425790
        Title:        Two-phase commit with security services: Using distinctive proofs to relieve fragile communications
        Authors:        Sun, Yang1; Feng, Xueshuai1; Zhu, Hongfeng1 Email author zhuhongfeng1978@163.com
        Author affiliation:        1 Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang; 110034, China
        Corresponding author:        Zhu, Hongfeng (zhuhongfeng1978@163.com)
        Source title:        International Journal of Network Security
        Abbreviated source title:        Int. J. Netw. Secur.
        Volume:        19
        Issue:        2
        Issue date:        2017
        Publication year:        2017
        Pages:        217-228
        Language:        English
        ISSN:        1816353X
        E-ISSN:        18163548
        Document type:        Journal article (JA)
        Publisher:        Femto Technique Co., Ltd.
        Abstract:        Inspired by stand-alone authentication, which can authenticate users when the connection to the central server is down, we present concepts called local proof and delayed proof that can adapt to two scenes when the authentication server is down: the former can solve self-authenticated to make local applications running without online authentication; the latter can solve two nodes to produce a session key for doing some transactions, but firstly they must exchange the delayed proof to prevent the fraud actions, specially, if the transaction is taking on the important process (such as contract signing or cash transaction), they must wait the authentication server is online. The key idea of our scheme is to improve the efficiency, and anyone can make effective use of the time to negotiate or do some unimportant things during the authentication server is down. Next, we propose a novel Chaotic Maps-based scheme against fragile communications, named CMFC, aiming to bypass the crashed authentication server temporarily for kinds of applications running. For important applications, we adopt the idea of two-phase commit protocol in our scheme: (1) the unavailable authentication server case, in which the CMFC can self-authenticated or compute a provisional delayed proof and a session key for two-party communicating. (2) the available authentication server case, in which, based on the phase (1) and the authentication server's verification, the two-party decides whether to commit (only if all have voted "Yes" or abort the transaction (otherwise). Finally, we give the formal security proof about our scheme with BAN logic and efficiency analysis.
        Number of references:        15
        Main heading:        Authentication
        Controlled terms:        Chaotic systems - Computer circuits - Efficiency - Lyapunov methods
        Uncontrolled terms:        Authentication servers - BAN logic - Chaotic map - Delayed proof - Efficiency analysis - Online authentication - Security services - Two phase commit protocols
        Classification code:        721.3Computer Circuits - 723Computer Software, Data Handling and Applications - 913.1Production Engineering - 961Systems Science
        DOI:        10.6633/IJNS.201703.19(2).06
        Database:        Compendex
                Compilation and indexing terms, © 2017 Elsevier Inc.
Full-text and Local Holdings Links
2Â¥2017-03-22 07:24:35
ÒÑÔÄ   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû
Ïà¹Ø°æ¿éÌø×ª ÎÒÒª¶©ÔÄÂ¥Ö÷ zhuhf µÄÖ÷Ìâ¸üÐÂ
×î¾ßÈËÆøÈÈÌûÍÆ¼ö [²é¿´È«²¿] ×÷Õß »Ø/¿´ ×îºó·¢±í
[¿¼ÑÐ] Çóµ÷¼Á +3 Ê®Èý¼ÓÓÍ 2026-03-21 3/150 2026-03-21 13:18 by zhukairuo
[¿¼ÑÐ] 286·ÖÈ˹¤ÖÇÄÜרҵÇëÇóµ÷¼ÁÔ¸Òâ¿ç¿¼£¡ +3 lemonzzn 2026-03-17 5/250 2026-03-21 11:28 by lemonzzn
[¿¼ÑÐ] 085601µ÷¼Á 358·Ö +3 zzzzggh 2026-03-20 4/200 2026-03-21 10:21 by luoyongfeng
[¿¼ÑÐ] 070300»¯Ñ§319Çóµ÷¼Á +7 ½õÀð0909 2026-03-17 7/350 2026-03-21 03:46 by JourneyLucky
[¿¼ÑÐ] 332Çóµ÷¼Á +4 ydfyh 2026-03-17 4/200 2026-03-21 02:20 by JourneyLucky
[¿¼ÑÐ] 278Çóµ÷¼Á +6 ÑÌ»ðÏÈÓÚ´º 2026-03-17 6/300 2026-03-21 01:57 by JourneyLucky
[¿¼ÑÐ] 085700×ÊÔ´Óë»·¾³308Çóµ÷¼Á +12 īīĮ 2026-03-18 13/650 2026-03-21 01:42 by JourneyLucky
[¿¼ÑÐ] Ò»Ö¾Ô¸»ªÄÏʦ´ó 070300£¨»¯Ñ§£©304·ÖÇóµ÷¼Á +3 0703ÎäÜ·»ÛÑ©304 2026-03-18 3/150 2026-03-21 00:48 by JourneyLucky
[¿¼ÑÐ] 304Çóµ÷¼Á +6 ÂüÊâ2266 2026-03-18 6/300 2026-03-21 00:32 by JourneyLucky
[¿¼ÑÐ] Ò»Ö¾Ô¸ÖÐÄÏ»¯Ñ§£¨0703£©×Ü·Ö337Çóµ÷¼Á +8 niko- 2026-03-19 9/450 2026-03-20 21:57 by luoyongfeng
[»ù½ðÉêÇë] ѧУÒѾ­Ìá½»µ½NSFC£¬»¹ÄÜÐÞ¸ÄÂ𣿠40+4 babangida 2026-03-19 8/400 2026-03-20 15:58 by babero
[¿¼ÑÐ] 085410È˹¤ÖÇÄÜר˶317Çóµ÷¼Á£¨0854¶¼¿ÉÒÔ£© +4 xbxudjdn 2026-03-18 4/200 2026-03-20 09:07 by ²»168
[¿¼ÑÐ] ¸´ÊÔµ÷¼Á +4 z1z2z3879 2026-03-14 6/300 2026-03-19 17:18 by fei626-918
[¿¼ÑÐ] 0703»¯Ñ§ 305Çóµ÷¼Á +4 FY_yy 2026-03-14 4/200 2026-03-19 05:54 by anny19840123
[¿¼ÑÐ] ÉúÎïѧ071000 329·ÖÇóµ÷¼Á +3 ÎÒ°®ÉúÎïÉúÎﰮΠ2026-03-17 3/150 2026-03-18 10:12 by macy2011
[¿¼ÑÐ] ²ÄÁÏר˶326Çóµ÷¼Á +6 Ä«ìÏæ¦Ý· 2026-03-15 7/350 2026-03-17 17:10 by ruiyingmiao
[¿¼ÑÐ] ¶«ÄÏ´óѧ364Çóµ÷¼Á +5 JasonYuiui 2026-03-15 5/250 2026-03-16 21:28 by ľ¹Ï¸à
[¿¼ÑÐ] 326Çóµ÷¼Á +4 ŵ±´¶û»¯Ñ§½±êéê 2026-03-15 7/350 2026-03-16 17:11 by ŵ±´¶û»¯Ñ§½±êéê
[¿¼ÑÐ] 0703»¯Ñ§µ÷¼Á 290·ÖÓпÆÑо­Àú£¬ÂÛÎÄÔÚͶ +7 ÄåÄågk 2026-03-14 7/350 2026-03-16 10:12 by houyaoxu
[¿¼ÑÐ] 288Çóµ÷¼Á +4 Ææµã0314 2026-03-14 4/200 2026-03-14 23:04 by JourneyLucky
ÐÅÏ¢Ìáʾ
ÇëÌî´¦ÀíÒâ¼û