| 2 | 1/1 | 返回列表 |
| 查看: 509 | 回復: 1 | ||
| 本帖產生 1 個 ,點擊這里進行查看 | ||
[求助]
求EI期刊檢索號!
|
||
| Dan Zhu, Liwei Wang, and Hongfeng Zhu. Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection. International Journal of Network Security, Vol.23, No.2, PP.278-285, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).11) EI index(JA) |
主管區(qū)長 (文壇精英)
|
Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection Accession number: 20211210101958 Authors: Zhu, Dan 1 ; Wang, Liwei 2 ; Zhu, Hongfeng 2 Author affiliations : 1 School of Foreign Languages, Shenyang Jianzhu University, No.9, HunNan East Street, HunNan District, Shenyang; 110168, China 2 Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang; 110034, China Corresponding author: Zhu, Dan (zhudan413@163.com) Source title: International Journal of Network Security Abbreviated source title: Int. J. Netw. Secur. Volume: 23 Issue: 2 Issue date: 2021 Publication Year: 2021 Pages: 278-285 Language: English ISSN: 1816353X E-ISSN: 18163548 Document type: Journal article (JA) Publisher: Femto Technique Co., Ltd. Abstract: With the continuous development of the information age, people's demand for information security also increases. In recent years, some people combine passwords with input Physically unclonable function (PUF) to authenticate unsafe communication more effectively. The PUF described in this authentication method has a hardware-based embedding function and has significant physical inconsistency. In this paper, we will continue to propose more effective authentication protocols based on the PUF algorithm. In published articles, authentication involves only one user and one server. Today, we discuss a text authentication protocol involving three parties: a three-party key agreement protocol based on the PUF algorithm. This key agreement protocol has more practical functions. The two users in the protocol and the server have different public keys and their private keys. After a series of calculations and the server's message transmission, the information in the two users' hands has matched again. Based on continuous experiments, we find that this key agreement protocol is effective. © 2021, International Journal of Network Security. All Rihts Reserved. Number of references: 12 Main heading: Authentication Controlled terms: Privacy by design - Public key cryptography Uncontrolled terms: Authenticated key agreement protocols - Authentication methods - Authentication protocols - Continuous development - Key agreement protocol - Message transmissions - Physically unclonable functions - Privacy protection Classification code: 723 Computer Software, Data Handling and Applications DOI: 10.6633/IJNS.20210323(2).11 Database: Compendex Compilation and indexing terms, © 2021 Elsevier Inc. |

| 2 | 1/1 | 返回列表 |
| 最具人氣熱帖推薦 [查看全部] | 作者 | 回/看 | 最后發(fā)表 | |
|---|---|---|---|---|
|
[考研] 311求調劑 +5 | 26研0 2026-03-15 | 5/250 |
|
|---|---|---|---|---|
|
[考研] 326求調劑 +3 | 諾貝爾化學獎覬?/a> 2026-03-15 | 3/150 |
|
|
[考研] 0854控制工程 359求調劑 可跨專業(yè) +3 | 626776879 2026-03-14 | 8/400 |
|
|
[考研] 344求調劑 +3 | knight344 2026-03-16 | 3/150 |
|
|
[考研] 0856專碩279求調劑 +5 | 加油加油!? 2026-03-15 | 5/250 |
|
|
[考研] 289求調劑 +4 | 這么名字咋樣 2026-03-14 | 6/300 |
|
|
[考研] 290求調劑 +4 | @將就將就看 2026-03-10 | 8/400 |
|
|
[考研]
|
zjptai 2026-03-10 | 5/250 |
|
|
[考研] 307求調劑 +7 | 超級伊昂大王 2026-03-10 | 7/350 |
|
|
[考研] 271求調劑 +10 | 生如夏花… 2026-03-11 | 10/500 |
|
|
[考研] 341求調劑 +3 | 番茄頭--- 2026-03-10 | 3/150 |
|
|
[考研] 329求調劑 +3 | miaodesi 2026-03-12 | 4/200 |
|
|
[考研] 材料與化工085600調劑求老師收留 +9 | jiaanl 2026-03-11 | 9/450 |
|
|
[考研] 【考研調劑求收留】 +3 | Ceciilia 2026-03-11 | 3/150 |
|
|
[考研] 求調劑 +3 | 程雨杭 2026-03-12 | 3/150 |
|
|
[考研] 308求調劑 +3 | 是Lupa啊 2026-03-12 | 3/150 |
|
|
[考研] 296求調劑 +3 | 大口吃飯 身體健 2026-03-13 | 3/150 |
|
|
[考研] 321求調劑(食品/專碩) +3 | xc321 2026-03-12 | 6/300 |
|
|
[考博] 26讀博 +4 | Rui135246 2026-03-12 | 10/500 |
|
|
[考研] 420求調劑 +4 | 莫向外求11 2026-03-10 | 6/300 |
|