| 查看: 494 | 回复: 1 | ||
| 本帖产生 1 个 ,点击这里进行查看 | ||
[求助]
求EI期刊检索号!
|
||
| Dan Zhu, Liwei Wang, and Hongfeng Zhu. Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection. International Journal of Network Security, Vol.23, No.2, PP.278-285, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).11) EI index(JA) |
» 猜你喜欢
AI 太可怕了,写基金时,提出想法,直接生成的文字比自己想得深远,还有科学性
已经有6人回复
有院领导为了换新车,用横向课题经费买了俩车
已经有9人回复
酰胺脱乙酰基
已经有13人回复
博士延得我,科研能力直往上蹿
已经有8人回复
同年申请2项不同项目,第1个项目里不写第2个项目的信息,可以吗
已经有4人回复
有时候真觉得大城市人没有县城人甚至个体户幸福
已经有10人回复
天津大学招2026.09的博士生,欢迎大家推荐交流(博导是本人)
已经有5人回复
遇见不省心的家人很难过
已经有22人回复
一直向前走走
主管区长 (文坛精英)
- 应助: 295 (大学生)
- 贵宾: 16.849
- 金币: 112398
- 散金: 30911
- 红花: 603
- 沙发: 1478
- 帖子: 24139
- 在线: 3976小时
- 虫号: 3833907
- 注册: 2015-04-26
- 专业: 图书馆、情报与文献学其他
- 管辖: 文献求助区
【答案】应助回帖
★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★
感谢参与,应助指数 +1
zhfzpk: 金币+20, ★★★★★最佳答案 2021-04-24 21:03:51
sunshan4379: LS-EPI+1, 感谢应助! 2021-04-28 10:55:08
感谢参与,应助指数 +1
zhfzpk: 金币+20, ★★★★★最佳答案 2021-04-24 21:03:51
sunshan4379: LS-EPI+1, 感谢应助! 2021-04-28 10:55:08
|
Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection Accession number: 20211210101958 Authors: Zhu, Dan 1 ; Wang, Liwei 2 ; Zhu, Hongfeng 2 Author affiliations : 1 School of Foreign Languages, Shenyang Jianzhu University, No.9, HunNan East Street, HunNan District, Shenyang; 110168, China 2 Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang; 110034, China Corresponding author: Zhu, Dan (zhudan413@163.com) Source title: International Journal of Network Security Abbreviated source title: Int. J. Netw. Secur. Volume: 23 Issue: 2 Issue date: 2021 Publication Year: 2021 Pages: 278-285 Language: English ISSN: 1816353X E-ISSN: 18163548 Document type: Journal article (JA) Publisher: Femto Technique Co., Ltd. Abstract: With the continuous development of the information age, people's demand for information security also increases. In recent years, some people combine passwords with input Physically unclonable function (PUF) to authenticate unsafe communication more effectively. The PUF described in this authentication method has a hardware-based embedding function and has significant physical inconsistency. In this paper, we will continue to propose more effective authentication protocols based on the PUF algorithm. In published articles, authentication involves only one user and one server. Today, we discuss a text authentication protocol involving three parties: a three-party key agreement protocol based on the PUF algorithm. This key agreement protocol has more practical functions. The two users in the protocol and the server have different public keys and their private keys. After a series of calculations and the server's message transmission, the information in the two users' hands has matched again. Based on continuous experiments, we find that this key agreement protocol is effective. © 2021, International Journal of Network Security. All Rihts Reserved. Number of references: 12 Main heading: Authentication Controlled terms: Privacy by design - Public key cryptography Uncontrolled terms: Authenticated key agreement protocols - Authentication methods - Authentication protocols - Continuous development - Key agreement protocol - Message transmissions - Physically unclonable functions - Privacy protection Classification code: 723 Computer Software, Data Handling and Applications DOI: 10.6633/IJNS.20210323(2).11 Database: Compendex Compilation and indexing terms, © 2021 Elsevier Inc. |

2楼2021-04-24 19:12:22













回复此楼