月旦知識庫
 
  1. 熱門:
 
首頁 臺灣期刊   法律   公行政治   醫事相關   財經   社會學   教育   其他 大陸期刊   核心   重要期刊 DOI文章
資訊科技國際期刊 本站僅提供期刊文獻檢索。
  【月旦知識庫】是否收錄該篇全文,敬請【登入】查詢為準。
最新【購點活動】


篇名
An Enhanced of Simple Three-Party Key Exchange Protocol
作者 Yang, Fuw-yi (Yang, Fuw-yi)Li, Wen-hui (Li, Wen-hui)Liao, Cai-ming (Liao, Cai-ming)
中文摘要
Based on the IEEE 802.16e standard, WiMAX proposes a Mobile Multihop Relay (MMR) approach defined in the IEEE 802.16j standard to extend the service area of Base Stations (BSs), and then improves the quality of received signal strength. Clearly, WiMAX MMR achieves a low-cost coverage-extension solution for the existing WiMAX network WiMAX MMR supports three types of Relay Stations (RS): Fixed RS, Nomadic RS and Mobile RS. Each type of RS is with different features on mobility and relay range. Since the relay-based WiMAX network includes different types of RSs, how to efficiently construct the relay-based WiMAX and how to determine an optimal routing path between a Mobile Station (MS) and the MR-BS are two important Issues that should be addressed. This paper thus proposes an IEEE 802.16j-conformed relay-based adaptive cost-based routing approach, in which a multihop optimal path is selected in terms of link bandwidth, path length and channel condition. Numerical results demonstrate that the proposed routing pproach significantly outperforms other approaches in fractional reward loss, network utiliThree-party password authenticated key exchange (3PAKE) protocol is capable of reducing the number of required keys stored by users in a conference. In 2007, Lu and Cao proposed a simple three-party password authenticated key exchange (S-3PAKE) protocol for assisting users to complete business negotiations and agreements during a communication process without requiring a public server key, and the S-3PAKE protocol can resist all known attacks. However, in 2008, Guo et al. pointed out the protocol proposed by Lu et al. still cannot resist man-in-the-middle attacks and online dictionary attacks thus further proposed an improved solution as follows. Two parties execute the 2-PAKE protocol to obtain an agreement key first, so that when they execute the 3PAKE protocol, they can authenticate the real identity with each other. An effective three-party password authenticated key exchange (3PAKE) protocol was proposed for authenticating the real identity of both parties without requiring an execution of the 2-PAKE protocol to obtain the agreement key first, but simply adding the real identity of the opposite party in the communication process, so as to achieve the same security effect.zation and average end-to-end path delay.
起訖頁 121-134
關鍵詞 Three-party key exchangePassword-authenticated key exchangeMan-in-the-middle attackDictionary attack
刊名 資訊科技國際期刊  
期數 200912 (3:2期)
出版單位 朝陽科技大學資訊學院
該期刊-上一篇 Adaptive Competitive On-Line Cost-based Routing Algorithm for IEEE 802.16j WiMAX Mobile Multihop Relay Networks
該期刊-下一篇 The Consensus Problem with Fallible Communication in Cloud Computing Environment
 

新書閱讀



最新影音


優惠活動




讀者服務專線:+886-2-23756688 傳真:+886-2-23318496
地址:臺北市館前路28 號 7 樓 客服信箱
Copyright © 元照出版 All rights reserved. 版權所有,禁止轉貼節錄