24小时热门版块排行榜    

查看: 303  |  回复: 1
本帖产生 1 个 ,点击这里进行查看

zhuhf

禁虫 (正式写手)

本帖内容被屏蔽

» 猜你喜欢

已阅   关注TA 给TA发消息 送TA红花 TA的回帖

baiyuefei

版主 (文学泰斗)

风雪

优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主优秀版主优秀版主

【答案】应助回帖

★ ★ ★ ★ ★ ★ ★ ★ ★ ★
感谢参与,应助指数 +1
zhuhf: 金币+10, ★★★★★最佳答案 2017-03-23 06:28:28
lazy锦溪: LS-EPI+1 2017-03-23 08:35:17
Accession number:       
20171003425790
        Title:        Two-phase commit with security services: Using distinctive proofs to relieve fragile communications
        Authors:        Sun, Yang1; Feng, Xueshuai1; Zhu, Hongfeng1 Email author zhuhongfeng1978@163.com
        Author affiliation:        1 Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang; 110034, China
        Corresponding author:        Zhu, Hongfeng (zhuhongfeng1978@163.com)
        Source title:        International Journal of Network Security
        Abbreviated source title:        Int. J. Netw. Secur.
        Volume:        19
        Issue:        2
        Issue date:        2017
        Publication year:        2017
        Pages:        217-228
        Language:        English
        ISSN:        1816353X
        E-ISSN:        18163548
        Document type:        Journal article (JA)
        Publisher:        Femto Technique Co., Ltd.
        Abstract:        Inspired by stand-alone authentication, which can authenticate users when the connection to the central server is down, we present concepts called local proof and delayed proof that can adapt to two scenes when the authentication server is down: the former can solve self-authenticated to make local applications running without online authentication; the latter can solve two nodes to produce a session key for doing some transactions, but firstly they must exchange the delayed proof to prevent the fraud actions, specially, if the transaction is taking on the important process (such as contract signing or cash transaction), they must wait the authentication server is online. The key idea of our scheme is to improve the efficiency, and anyone can make effective use of the time to negotiate or do some unimportant things during the authentication server is down. Next, we propose a novel Chaotic Maps-based scheme against fragile communications, named CMFC, aiming to bypass the crashed authentication server temporarily for kinds of applications running. For important applications, we adopt the idea of two-phase commit protocol in our scheme: (1) the unavailable authentication server case, in which the CMFC can self-authenticated or compute a provisional delayed proof and a session key for two-party communicating. (2) the available authentication server case, in which, based on the phase (1) and the authentication server's verification, the two-party decides whether to commit (only if all have voted "Yes" or abort the transaction (otherwise). Finally, we give the formal security proof about our scheme with BAN logic and efficiency analysis.
        Number of references:        15
        Main heading:        Authentication
        Controlled terms:        Chaotic systems - Computer circuits - Efficiency - Lyapunov methods
        Uncontrolled terms:        Authentication servers - BAN logic - Chaotic map - Delayed proof - Efficiency analysis - Online authentication - Security services - Two phase commit protocols
        Classification code:        721.3Computer Circuits - 723Computer Software, Data Handling and Applications - 913.1Production Engineering - 961Systems Science
        DOI:        10.6633/IJNS.201703.19(2).06
        Database:        Compendex
                Compilation and indexing terms, © 2017 Elsevier Inc.
Full-text and Local Holdings Links
2楼2017-03-22 07:24:35
已阅   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 zhuhf 的主题更新
信息提示
请填处理意见