请帮忙查询一下Verification of trusted network access protocols in t
来源:学生作业帮 编辑:搜搜做题作业网作业帮 分类:综合作业 时间:2024/04/26 21:17:51
请帮忙查询一下Verification of trusted network access protocols in the strand space model的EI检索号,:)
Accession number:
20121114845374(EI检索号)
Title:Verificationoftrustednetworkaccessprotocolsinthestrandspacemodel
Authors:Xiao,Yuelei1; Wang,Yumin1; Pang,Liaojun1
Author affiliation:1State Key Lab.of Integrated Service Networks,Xidian University,China
Source title:IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences
Abbreviated source title:IEICE Trans Fund Electron Commun Comput Sci
Volume:E95-A
Issue:3
Issue date:March 2012
Publication year:2012
Pages:665-668
Language:English
Document type:Journal article (JA)
Publisher:Maruzen Co.,Ltd.,P.O.Box 247,Nihonbashi,Tokyo,103-8691,Japan
Abstract:Trusted network access protocols are proposed for the security and authorization of network-access requests.Because they differ greatly from traditional security protocols on security demands,they can not be analyzed with previous strand space works directly.To solve this problem,we first give some extensions necessary to verify them in this letter.Moreover,we point out Zhuo Ma et al.'s MN-TAP protocol is unsecure based on the Strand Space Model (SSM),and then improve the MN-TAP protocol and show that the improved MN-TAP protocol is secure in the SSM.Copyright © 2012 The Institute of Electronics,Information and Communication Engineers.
Number of references:8
Main heading:Network security
Controlled terms:Network protocols
Uncontrolled terms:Penetrators - Security protocols - Strand space - Strand Space model - Trusted network access
Classification code:723 Computer Software,Data Handling and Applications
DOI:10.1587/transfun.E95.A.665
Database:Compendex
Compilation and indexing terms,© 2013 Elsevier Inc.
20121114845374(EI检索号)
Title:Verificationoftrustednetworkaccessprotocolsinthestrandspacemodel
Authors:Xiao,Yuelei1; Wang,Yumin1; Pang,Liaojun1
Author affiliation:1State Key Lab.of Integrated Service Networks,Xidian University,China
Source title:IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences
Abbreviated source title:IEICE Trans Fund Electron Commun Comput Sci
Volume:E95-A
Issue:3
Issue date:March 2012
Publication year:2012
Pages:665-668
Language:English
Document type:Journal article (JA)
Publisher:Maruzen Co.,Ltd.,P.O.Box 247,Nihonbashi,Tokyo,103-8691,Japan
Abstract:Trusted network access protocols are proposed for the security and authorization of network-access requests.Because they differ greatly from traditional security protocols on security demands,they can not be analyzed with previous strand space works directly.To solve this problem,we first give some extensions necessary to verify them in this letter.Moreover,we point out Zhuo Ma et al.'s MN-TAP protocol is unsecure based on the Strand Space Model (SSM),and then improve the MN-TAP protocol and show that the improved MN-TAP protocol is secure in the SSM.Copyright © 2012 The Institute of Electronics,Information and Communication Engineers.
Number of references:8
Main heading:Network security
Controlled terms:Network protocols
Uncontrolled terms:Penetrators - Security protocols - Strand space - Strand Space model - Trusted network access
Classification code:723 Computer Software,Data Handling and Applications
DOI:10.1587/transfun.E95.A.665
Database:Compendex
Compilation and indexing terms,© 2013 Elsevier Inc.
帮忙查一下这篇文章IE检索号The application of fuzzy neural network in cog
radio access network是什么意思
请求帮忙查询EI检索哪位好心人帮忙查询一下文章“Design and Implementation of Logisti
请帮忙查询一下SCI和EI检索号,:)
请帮忙查询一下论文是否被SCI检索
请帮忙查询一下本文的EI检索号,
英语翻译帮忙看看这句英语怎么理解---The UK network of Business Links claims t
英语翻译帮忙翻译一下TV-Turnoff Network
the internet is a worldwide network of computers.请帮忙翻译.
WCDMA Radio Access Network是什么意思
请帮忙翻译You don't have permission to access /skins/download_ex.
英语翻译real-time access,and in-network processing make a qualit