| 查看: 485 | 回复: 1 | ||
| 本帖产生 1 个 ,点击这里进行查看 | ||
[求助]
求EI期刊检索号!
|
||
| Dan Zhu, Liwei Wang, and Hongfeng Zhu. Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection. International Journal of Network Security, Vol.23, No.2, PP.278-285, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).11) EI index(JA) |
» 猜你喜欢
有没有人能给点建议
已经有5人回复
假如你的研究生提出不合理要求
已经有12人回复
实验室接单子
已经有7人回复
全日制(定向)博士
已经有5人回复
萌生出自己或许不适合搞科研的想法,现在跑or等等看?
已经有4人回复
Materials Today Chemistry审稿周期
已经有4人回复
参与限项
已经有3人回复
对氯苯硼酸纯化
已经有3人回复
所感
已经有4人回复
要不要辞职读博?
已经有7人回复
一直向前走走
主管区长 (文坛精英)
- 应助: 295 (大学生)
- 贵宾: 16.849
- 金币: 112397
- 散金: 30911
- 红花: 602
- 沙发: 1478
- 帖子: 24139
- 在线: 3976小时
- 虫号: 3833907
- 注册: 2015-04-26
- 专业: 图书馆、情报与文献学其他
- 管辖: 文献求助区
【答案】应助回帖
★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★
感谢参与,应助指数 +1
zhfzpk: 金币+20, ★★★★★最佳答案 2021-04-24 21:03:51
sunshan4379: LS-EPI+1, 感谢应助! 2021-04-28 10:55:08
感谢参与,应助指数 +1
zhfzpk: 金币+20, ★★★★★最佳答案 2021-04-24 21:03:51
sunshan4379: LS-EPI+1, 感谢应助! 2021-04-28 10:55:08
|
Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection Accession number: 20211210101958 Authors: Zhu, Dan 1 ; Wang, Liwei 2 ; Zhu, Hongfeng 2 Author affiliations : 1 School of Foreign Languages, Shenyang Jianzhu University, No.9, HunNan East Street, HunNan District, Shenyang; 110168, China 2 Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang; 110034, China Corresponding author: Zhu, Dan (zhudan413@163.com) Source title: International Journal of Network Security Abbreviated source title: Int. J. Netw. Secur. Volume: 23 Issue: 2 Issue date: 2021 Publication Year: 2021 Pages: 278-285 Language: English ISSN: 1816353X E-ISSN: 18163548 Document type: Journal article (JA) Publisher: Femto Technique Co., Ltd. Abstract: With the continuous development of the information age, people's demand for information security also increases. In recent years, some people combine passwords with input Physically unclonable function (PUF) to authenticate unsafe communication more effectively. The PUF described in this authentication method has a hardware-based embedding function and has significant physical inconsistency. In this paper, we will continue to propose more effective authentication protocols based on the PUF algorithm. In published articles, authentication involves only one user and one server. Today, we discuss a text authentication protocol involving three parties: a three-party key agreement protocol based on the PUF algorithm. This key agreement protocol has more practical functions. The two users in the protocol and the server have different public keys and their private keys. After a series of calculations and the server's message transmission, the information in the two users' hands has matched again. Based on continuous experiments, we find that this key agreement protocol is effective. © 2021, International Journal of Network Security. All Rihts Reserved. Number of references: 12 Main heading: Authentication Controlled terms: Privacy by design - Public key cryptography Uncontrolled terms: Authenticated key agreement protocols - Authentication methods - Authentication protocols - Continuous development - Key agreement protocol - Message transmissions - Physically unclonable functions - Privacy protection Classification code: 723 Computer Software, Data Handling and Applications DOI: 10.6633/IJNS.20210323(2).11 Database: Compendex Compilation and indexing terms, © 2021 Elsevier Inc. |

2楼2021-04-24 19:12:22












回复此楼