淡江大學機構典藏:Item 987654321/75782
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 56379/90243 (62%)
造访人次 : 11686436      在线人数 : 43
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/75782


    题名: Cryptanalysis and Improvement of Wen et al.'s Provably Secure Authentication Key Exchange Protocols for Low Power Computing Devices
    作者: Shieh, Wen-Gong;Horng, Wen-Bing
    贡献者: 淡江大學資訊工程學系
    关键词: Authenticated key exchange protocol;Cryptanalysis;Low power computing
    日期: 2011-11
    上传时间: 2012-04-14 06:23:39 (UTC+8)
    出版者: Japan: ICIC International
    摘要: Designing authenticated key exchange protocols for portable devices to secure communications is an emerging issue. Recently, Wen et al. proposed two provably secure authenticated key exchange protocols for low power computing devices. However, we show that the first protocol is vulnerable to the replay attack, while the second one is subject to the generic man-in-the-middle attack. Besides, both protocols are susceptible to the modification attack as well as the user impersonation attack. Based on the underline
    reasons of such successful attacks, we extend their protocols to defend such attacks.
    關聯: ICIC Express Letters: An International Journal of Research and Surveys 5(11), pp.4027-4032
    显示于类别:[資訊工程學系暨研究所] 期刊論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    1881-803X_5(11)p4027-4032.pdf1063KbAdobe PDF0检视/开启

    在機構典藏中所有的数据项都受到原著作权保护.

    TAIR相关文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈