English
| 正體中文 |
简体中文
|
全文筆數/總筆數 : 2928/5721 (51%)
造訪人次 : 373001 線上人數 : 429
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
搜尋範圍
全部NCUTIR
電資學院
資訊工程系(所)
--【資訊工程系所】期刊論文
查詢小技巧:
您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
進階搜尋
主頁
‧
登入
‧
上傳
‧
說明
‧
關於NCUTIR
‧
管理
勤益科大機構典藏
>
電資學院
>
資訊工程系(所)
>
【資訊工程系所】期刊論文
>
Item 987654321/7252
資料載入中.....
書目資料匯出
Endnote RIS 格式資料匯出
Bibtex 格式資料匯出
引文資訊
資料載入中.....
資料載入中.....
請使用永久網址來引用或連結此文件:
http://ir.lib.ncut.edu.tw/handle/987654321/7252
題名:
Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications
作者:
林宗宏
貢獻者:
資訊工程系
日期:
2012-12
上傳時間:
2018-05-24 09:49:44 (UTC+8)
摘要:
To enhance the efficiency and the security in an anonymous channel of wireless systems, Yang et al. proposed a secure and efficient authentication protocol for an anonymous channel in wireless communications. The protocol did not use asymmetric cryptosystems to protect the identity of the mobile user because the cryptosystems have high complex and high computation cost. Not only can the protocol resist some security attacks but also the computation cost is low. However, the authors shall point out that their protocol is vulnerable to key compromise attack. Through this attack, any adversary can obtain the secret key Kh,ishared between the home network (HN) and the mobile station (MS). Then, the adversary can wiretap any messages that he/she wants using the secret key between the HN and the MS. © 2012 John Wiley & Sons, Ltd. (18 refs)
關聯:
Security and Communication Networks
顯示於類別:
[資訊工程系(所)] 【資訊工程系所】期刊論文
文件中的檔案:
沒有與此文件相關的檔案.
檢視Licence
在NCUTIR中所有的資料項目都受到原著作權保護.
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
回饋