Authentication and key distribution protocol for distributed computer environment

被引:0
|
作者
Sun, Xiaorong [1 ]
Wang, Yumin [1 ]
机构
[1] Xidian Univ, Xi'an, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:577 / 581
相关论文
共 50 条
  • [21] Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol
    Liu, Bin
    Gao, Zhifeng
    Xiao, Di
    Huang, Wei
    Zhang, Zhiqing
    Xu, Bingjie
    ENTROPY, 2019, 21 (05)
  • [22] BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs
    Xu, Guangquan
    Li, Xiaotong
    Jiao, Litao
    Wang, Weizhe
    Liu, Ao
    Su, Chunhua
    Zheng, Xi
    Liu, Shaoying
    Cheng, Xiaochun
    IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (07) : 35 - 41
  • [23] AUTHMAC_DH: A new protocol for authentication and key distribution
    Aslan, HK
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2003, 2828 : 14 - 26
  • [24] Mutual authentication key distribution protocol based on ghost imaging
    Kang, Yi
    Bai, Chunyan
    Liu, Baolin
    Zhang, Dawei
    OPTICS AND LASER TECHNOLOGY, 2023, 162
  • [25] A security enhanced authentication and key distribution protocol for wireless networks
    Lv, Chao
    Ma, Maode
    Li, Hui
    Ma, Jianfeng
    Niu, Ben
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (04) : 343 - 352
  • [26] Authentication and ID-Based Key Management Protocol in Pervasive Environment
    Moon, Jong Sik
    Park, Jong Hyuk
    Lee, Deok Gyu
    Lee, Im-Yeong
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 91 - 103
  • [27] Efficient user authentication protocol for distributed multimedia mobile cloud environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, U. Srinivasulu
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (05) : 1933 - 1956
  • [28] Authentication and ID-Based Key Management Protocol in Pervasive Environment
    Jong Sik Moon
    Jong Hyuk Park
    Deok Gyu Lee
    Im-Yeong Lee
    Wireless Personal Communications, 2010, 55 : 91 - 103
  • [29] A scalable mutual authentication and key distribution mechanism in a NEMO environment
    Kim, M
    Kim, E
    Chae, K
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 1, 2005, 3480 : 591 - 600
  • [30] Secure authentication and key distribution protocols for Internet/Intranet environment
    Sun, Xiaorong
    Wang, Yumin
    2000, Sci Press (22):