Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Add to Favorite Get Latest Update

Two Way Authentications Based on Symmetric Cryptosystems

Chen Kefei Department of Computer Science & Engineering, Shanghai Jiaotong University, China  
Secure authenticated exchange is essential to network security. Two way authentication is often needed between two parties in a communication network, but the two way authentication is not simply twice the one way. This paper investigates protocols for two way authentication by using only private key cryptosystems, and discusses the security of such authentication protocols.
【Fund】: 国家自然科学基金
【CateGory Index】: TN918.1
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 Hu Xiangyi1,Li Yan2 1 Beijing Science and Technology Information Institute,Beijing,100044 2 Beijing Fengtai Government Information Center,Beijing,100071;The Use of Symmetric Cipher in Identification[J];Network Security Technology & Application;2007-03
China Proceedings of conference Full-text Database 2 Hits
1 Guo Weidong~1 Xie Yongqiang~2 Wang Zhaojun~2 1 Institute of Command Automation,PLAUST,Nanjing 210007; 2 Institute of China Electronic System Engineering,Beijing 100039;Research and Implementation of Removable mass storage device Authentication mechanisms[A];[C];2008
2 JIANG Guoqing ZHOU Guoxiang Department of Computer Science, Hefei University of Technology 230009;Research Of iSCSI Authentication Model Based on Symmetric Cryptography System and RSA Protocol[A];[C];2006
Chinese Journal Full-text Database 10 Hits
1 LI Wei,LIU Jia-yong(Institute of Information Security,SCU,Chengdu 610064,China);A security method based on boot sector of logic partition for removable storage medium[J];Journal of Chengdu University of Information Technology;2007-01
2 Li zhongxian Zhan Banghua Yang Yixian (Beijing University of Posts and Telecommunications,Beijing 100876);A Survey of Identification and Authentication[J];ACTA ELECTRONICA SINICA;1999-01
3 SHANG Yu-lian~1, FU Hai-yan~2, SHI Kai-quan~3 (1.School of Control Science and Technology, Shandong University, Jinan 250061,China; 2.Department of Computer Science and Educational Technology,Hainan Normal University,Haikou 571185,China; 3.School of Mathematics and System Sciences, Shandong University,Jinan 250100,China);Improved authentication and key distribution for internet environment[J];Journal of Hainan Normal University(Natural Science);2004-03
4 ;Data Mining and Ensemble of Learning Methods[J];Computer Science;2001-07
5 ;The Develepment Research on the Data Mining[J];Computer Science;2001-07
6 Zhao Yiming Liu Liming Bao Zhendong (Department of Computer Science,Fudan University Shanghai 200433);Computer Networks' Security Mechanisms of Authentication Based Public Key Cryptography[J];Computer Engineering;1997-S1
7 Sheng Huanye; Wang Jue(Shanghai Jiaotong University, Computer Science Department Shanghai 200030);Kerberos Based Public Key Authentication Protocol[J];COMPUTER ENGINEERING;1998-09
8 WANG Tao,XIE Dong-qing,ZHOU Zhou-yi (College of Computer & Communication, Hunan University, Changsha Hunan 410082, China);A Type of New Two-way Authenticate One-time Password System[J];Application Research of Computers;2005-09
9 Ou Yangqi, Jiang XingHao, Sun TanFeng (School of Information Security Engineering, Shanghai Jiao Tong University,Shanghai 200240, China);A Secure RFID System Based on Mutual Authentication[J];China Information Security;2006-12
10 WANG Li, CAI Wandong (School of Computer Science, Northwestern Polytechnic University, Xi'an 710072, China);Design and Implementation of Removable Storage Device Monitoring System[J];China Information Security;2007-02
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved