首页 | 本学科首页   官方微博 | 高级检索  
     

Research on Mixed Encryption Authentication
作者姓名:SUN Zhi-xin~  WANG Ru-chuan~
作者单位:SUN Zhi-xin~1,WANG Ru-chuan~(1,2),WANG Shao-di~1(1.Department of Computer Science and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,P.R. China;2.State Key Laboratory of Information Security,Graduate School of Chinese Academy,Beijing 100039,P.R. China)
基金项目:ThisworkissupportedbyNationalNaturalSciencesFund(No.60 1 730 37and70 2 71 0 50 ),JiangsuUniversityNaturalScienceResearchFund(No.0 3kjb52 0 0 90,theNaturalScienceFoundationofJiangsuProvince(No.BK2 0 0 31 0 5)andkeyLaboratoryofInformationTechnologyP
摘    要:1 IntroductionWiththedevelopmentofcomputernetworktechniquesandthecontinuousavalancheofnewap plications,viciousnetworkattackeventshavemadeusers’lossesincreaserapidly .Andtheproblemofnetworksecurityisbecomingmoreandmorecom plex1 ] .Inanetworksecurityenvironment,identi fyingandtestingmainbodyandobjectisaprecondi tionforcomputernetworksafety .Peoplewouldsus pectentitiesandcommunicationdatawhicharenotauthenticated .However,actualauthenticationpro tocolshavesomeshortcomingsinsafety ,systemef fic…


Research on Mixed Encryption Authentication
SUN Zhi-xin,WANG Ru-chuan.Research on Mixed Encryption Authentication[J].The Journal of China Universities of Posts and Telecommunications,2003,10(4).
Authors:Sun Zhi-xin  WANG Ru-chuan  WANG Shao-di
Abstract:With the development of network techniques, the problem of network security is also arising as we enjoy its open convenience. There are many developed methods to overcome this problem. Identity authentication is one of these important measures. The authentication methods of traditional symmetric cryptogram systems and asymmetric cryptogram systems have both advantages and defects. This paper brings forward a Mixed Encryption Model for Authentication (MEMA), which has obvious advantages compared to the two traditional methods. MEMA model can be used widely in opening network environment such as mobile agent systems, multi-agents security safeguard systems and other situations in which identity authentication of users are needed. At last, the paper also presents the MEMA model's structure and implementation of an experimental system.
Keywords:network security  encryption authentication  mixed encryption system
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号