| ²é¿´: 530 | »Ø¸´: 1 | |||
| ±¾Ìû²úÉú 1 ¸ö £¬µã»÷ÕâÀï½øÐв鿴 | |||
zhfzpkгæ (ÕýʽдÊÖ)
|
[ÇóÖú]
ÇóEIÆÚ¿¯¼ìË÷ºÅ£¡
|
||
| Dan Zhu, Liwei Wang, and Hongfeng Zhu. Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection. International Journal of Network Security, Vol.23, No.2, PP.278-285, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).11) EI index(JA) |
» ²ÂÄãϲ»¶
µ÷¼ÁÇóÊÕÁô
ÒѾÓÐ6È˻ظ´
272·Ö²ÄÁÏ×ÓÇóµ÷¼Á
ÒѾÓÐ36È˻ظ´
275Çóµ÷¼Á
ÒѾÓÐ8È˻ظ´
Ò»Ö¾Ô¸211£¬»¯Ñ§Ñ§Ë¶£¬310·Ö£¬±¾¿ÆÖصãË«·Ç£¬Çóµ÷¼Á
ÒѾÓÐ20È˻ظ´
070300»¯Ñ§Ñ§Ë¶311·ÖÇóµ÷¼Á
ÒѾÓÐ19È˻ظ´
²ÄÁÏÓ뻯¹¤µ÷¼Á
ÒѾÓÐ13È˻ظ´
²ÄÁÏÓ뻯¹¤µ÷¼Á
ÒѾÓÐ33È˻ظ´
¸´ÊÔµ÷¼Á
ÒѾÓÐ7È˻ظ´
Ò»Ö¾Ô¸¹þ¹¤´ó 085600 277 12²Ä¿Æ»ùÇóµ÷¼Á
ÒѾÓÐ17È˻ظ´
»¹Óл¯¹¤¶þÂÖµ÷¼ÁµÄѧУÂð
ÒѾÓÐ47È˻ظ´
Ò»Ö±Ïòǰ×ß×ß
Ö÷¹ÜÇø³¤ (ÎÄ̳¾«Ó¢)
- Ó¦Öú: 295 (´óѧÉú)
- ¹ó±ö: 16.849
- ½ð±Ò: 112404
- É¢½ð: 30911
- ºì»¨: 603
- ɳ·¢: 1478
- Ìû×Ó: 24141
- ÔÚÏß: 3976Сʱ
- ³æºÅ: 3833907
- ×¢²á: 2015-04-26
- רҵ: ͼÊé¹Ý¡¢Ç鱨ÓëÎÄÏ×ѧÆäËû
- ¹ÜϽ: ÎÄÏ×ÇóÖúÇø
¡¾´ð°¸¡¿Ó¦Öú»ØÌû
¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï
¸Ðл²ÎÓ룬ӦÖúÖ¸Êý +1
zhfzpk: ½ð±Ò+20, ¡ï¡ï¡ï¡ï¡ï×î¼Ñ´ð°¸ 2021-04-24 21:03:51
sunshan4379: LS-EPI+1, ¸ÐлӦÖú! 2021-04-28 10:55:08
¸Ðл²ÎÓ룬ӦÖúÖ¸Êý +1
zhfzpk: ½ð±Ò+20, ¡ï¡ï¡ï¡ï¡ï×î¼Ñ´ð°¸ 2021-04-24 21:03:51
sunshan4379: LS-EPI+1, ¸ÐлӦÖú! 2021-04-28 10:55:08
|
Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection Accession number: 20211210101958 Authors: Zhu, Dan 1 ; Wang, Liwei 2 ; Zhu, Hongfeng 2 Author affiliations : 1 School of Foreign Languages, Shenyang Jianzhu University, No.9, HunNan East Street, HunNan District, Shenyang; 110168, China 2 Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang; 110034, China Corresponding author: Zhu, Dan (zhudan413@163.com) Source title: International Journal of Network Security Abbreviated source title: Int. J. Netw. Secur. Volume: 23 Issue: 2 Issue date: 2021 Publication Year: 2021 Pages: 278-285 Language: English ISSN: 1816353X E-ISSN: 18163548 Document type: Journal article (JA) Publisher: Femto Technique Co., Ltd. Abstract: With the continuous development of the information age, people's demand for information security also increases. In recent years, some people combine passwords with input Physically unclonable function (PUF) to authenticate unsafe communication more effectively. The PUF described in this authentication method has a hardware-based embedding function and has significant physical inconsistency. In this paper, we will continue to propose more effective authentication protocols based on the PUF algorithm. In published articles, authentication involves only one user and one server. Today, we discuss a text authentication protocol involving three parties: a three-party key agreement protocol based on the PUF algorithm. This key agreement protocol has more practical functions. The two users in the protocol and the server have different public keys and their private keys. After a series of calculations and the server's message transmission, the information in the two users' hands has matched again. Based on continuous experiments, we find that this key agreement protocol is effective. © 2021, International Journal of Network Security. All Rihts Reserved. Number of references: 12 Main heading: Authentication Controlled terms: Privacy by design - Public key cryptography Uncontrolled terms: Authenticated key agreement protocols - Authentication methods - Authentication protocols - Continuous development - Key agreement protocol - Message transmissions - Physically unclonable functions - Privacy protection Classification code: 723 Computer Software, Data Handling and Applications DOI: 10.6633/IJNS.20210323(2).11 Database: Compendex Compilation and indexing terms, © 2021 Elsevier Inc. |

2Â¥2021-04-24 19:12:22













»Ø¸´´ËÂ¥
10