作业帮 > 综合 > 作业

请帮忙查询一下Verification of trusted network access protocols in t

来源:学生作业帮 编辑:搜搜做题作业网作业帮 分类:综合作业 时间:2024/04/26 21:17:51
请帮忙查询一下Verification of trusted network access protocols in the strand space model的EI检索号,:)
请帮忙查询一下Verification of trusted network access protocols in t
Accession number:
20121114845374(EI检索号)
Title:Verificationoftrustednetworkaccessprotocolsinthestrandspacemodel
Authors:Xiao,Yuelei1; Wang,Yumin1; Pang,Liaojun1
Author affiliation:1State Key Lab.of Integrated Service Networks,Xidian University,China
Source title:IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences
Abbreviated source title:IEICE Trans Fund Electron Commun Comput Sci
Volume:E95-A
Issue:3
Issue date:March 2012
Publication year:2012
Pages:665-668
Language:English
Document type:Journal article (JA)
Publisher:Maruzen Co.,Ltd.,P.O.Box 247,Nihonbashi,Tokyo,103-8691,Japan
Abstract:Trusted network access protocols are proposed for the security and authorization of network-access requests.Because they differ greatly from traditional security protocols on security demands,they can not be analyzed with previous strand space works directly.To solve this problem,we first give some extensions necessary to verify them in this letter.Moreover,we point out Zhuo Ma et al.'s MN-TAP protocol is unsecure based on the Strand Space Model (SSM),and then improve the MN-TAP protocol and show that the improved MN-TAP protocol is secure in the SSM.Copyright © 2012 The Institute of Electronics,Information and Communication Engineers.
Number of references:8
Main heading:Network security
Controlled terms:Network protocols
Uncontrolled terms:Penetrators - Security protocols - Strand space - Strand Space model - Trusted network access
Classification code:723 Computer Software,Data Handling and Applications
DOI:10.1587/transfun.E95.A.665
Database:Compendex
Compilation and indexing terms,© 2013 Elsevier Inc.