English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 51296/86402 (59%)
造訪人次 : 8156655      線上人數 : 148
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/75782


    題名: Cryptanalysis and Improvement of Wen et al.'s Provably Secure Authentication Key Exchange Protocols for Low Power Computing Devices
    作者: Shieh, Wen-Gong;Horng, Wen-Bing
    貢獻者: 淡江大學資訊工程學系
    關鍵詞: Authenticated key exchange protocol;Cryptanalysis;Low power computing
    日期: 2011-11
    上傳時間: 2012-04-14 06:23:39 (UTC+8)
    出版者: Japan: ICIC International
    摘要: Designing authenticated key exchange protocols for portable devices to secure communications is an emerging issue. Recently, Wen et al. proposed two provably secure authenticated key exchange protocols for low power computing devices. However, we show that the first protocol is vulnerable to the replay attack, while the second one is subject to the generic man-in-the-middle attack. Besides, both protocols are susceptible to the modification attack as well as the user impersonation attack. Based on the underline
    reasons of such successful attacks, we extend their protocols to defend such attacks.
    關聯: ICIC Express Letters: An International Journal of Research and Surveys 5(11), pp.4027-4032
    顯示於類別:[資訊工程學系暨研究所] 期刊論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    1881-803X_5(11)p4027-4032.pdf1063KbAdobe PDF0檢視/開啟

    在機構典藏中所有的資料項目都受到原著作權保護.

    TAIR相關文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋