English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90069/105176 (86%)
Visitors : 6332987      Online Users : 262
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊工程學系 > 會議論文 >  Item 310904400/7360

    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/7360

    Title: Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices
    Authors: Chang, C. C.;Lin, S. Y.;Yang, J. H
    Date: 2009-10
    Issue Date: 2010-01-29 14:38:54 (UTC+8)
    Publisher: Asia University
    Abstract: Kerberos is a well-known network authentication mechanism. Based upon Kerberos' model, Sun and Yeh proposed three user authentication and key establishment (UAKE) protocols with perfect forward secrecy (PFS). However, due to the use of public-key cryptosystem to implement UAKE, their protocols are not suitable for mobile devices, which have computational, power and storage constraints. Therefore, in this paper, we propose three UAKE protocols with PFS that are efficient and practical for mobile devices. And because our protocols are based on one-way hash functions and exclusive-or (XOR) operations, the computation loads and the power requirements are less than those in Sun and Yeh's protocols.
    Relation: The IEEE 9th International Conference on Computer and Information Technology (CIT 2009) , 2009-10. Xiamen, China
    Appears in Collections:[資訊工程學系] 會議論文

    Files in This Item:

    File Description SizeFormat

    All items in ASIAIR are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback