24小时热门版块排行榜    

查看: 485  |  回复: 1
本帖产生 1 个 ,点击这里进行查看

zhfzpk

新虫 (正式写手)

[求助] 求EI期刊检索号!

Dan Zhu, Liwei Wang, and Hongfeng Zhu. Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection. International Journal of Network Security, Vol.23, No.2, PP.278-285, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).11) EI index(JA)

» 猜你喜欢

已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

一直向前走走

主管区长 (文坛精英)

优秀版主优秀版主优秀版主

【答案】应助回帖

★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★
感谢参与,应助指数 +1
zhfzpk: 金币+20, ★★★★★最佳答案 2021-04-24 21:03:51
sunshan4379: LS-EPI+1, 感谢应助! 2021-04-28 10:55:08
Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection
Accession number: 20211210101958
Authors: Zhu, Dan 1 ; Wang, Liwei 2 ; Zhu, Hongfeng 2
Author affiliations : 1 School of Foreign Languages, Shenyang Jianzhu University, No.9, HunNan East Street, HunNan District, Shenyang; 110168, China
2 Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang; 110034, China
Corresponding author: Zhu, Dan (zhudan413@163.com)
Source title: International Journal of Network Security
Abbreviated source title: Int. J. Netw. Secur.
Volume: 23
Issue: 2
Issue date: 2021
Publication Year: 2021
Pages: 278-285
Language: English
ISSN: 1816353X
E-ISSN: 18163548
Document type: Journal article (JA)
Publisher: Femto Technique Co., Ltd.
Abstract: With the continuous development of the information age, people's demand for information security also increases. In recent years, some people combine passwords with input Physically unclonable function (PUF) to authenticate unsafe communication more effectively. The PUF described in this authentication method has a hardware-based embedding function and has significant physical inconsistency. In this paper, we will continue to propose more effective authentication protocols based on the PUF algorithm. In published articles, authentication involves only one user and one server. Today, we discuss a text authentication protocol involving three parties: a three-party key agreement protocol based on the PUF algorithm. This key agreement protocol has more practical functions. The two users in the protocol and the server have different public keys and their private keys. After a series of calculations and the server's message transmission, the information in the two users' hands has matched again. Based on continuous experiments, we find that this key agreement protocol is effective.
© 2021, International Journal of Network Security. All Rihts Reserved.
Number of references: 12
Main heading: Authentication
Controlled terms: Privacy by design -  Public key cryptography
Uncontrolled terms: Authenticated key agreement protocols -  Authentication methods -  Authentication protocols -  Continuous development -  Key agreement protocol -  Message transmissions -  Physically unclonable functions -  Privacy protection
Classification code: 723 Computer Software, Data Handling and Applications
DOI: 10.6633/IJNS.20210323(2).11
Database: Compendex
Compilation and indexing terms, © 2021 Elsevier Inc.
FROMZEROTOHERO
2楼2021-04-24 19:12:22
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 zhfzpk 的主题更新
信息提示
请填处理意见