The Improvement of Authentication Mechanisms

被引:0
|
作者
Shuo, Li [1 ,2 ]
Chong, Sun [3 ]
机构
[1] Univ Sci & Technol Liaoning, Anshan 114044, Peoples R China
[2] Northeastern Univ, Shenyang 110819, Liaoning, Peoples R China
[3] China Mobile Liaoning Branch Co, Shenyang 110179, Liaoning, Peoples R China
关键词
protocol of authentication; public key; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new authentication protocols is proposed based on asymmetric key encryption functions. Through analysis, the improved protocol not only meets to security requirement of the third generation mobile communication, but also improve the insufficient security of the published authentication protocol
引用
收藏
页码:5287 / 5289
页数:3
相关论文
共 50 条
  • [21] An Improvement of Image Secret Sharing and Hiding With Authentication
    Aghaziarati, S.
    Saryazdi, S.
    Nezamabadipour, H.
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 38 - 42
  • [22] Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
    Li, Fagen
    Takagi, Tsuyoshi
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1391 - 1398
  • [23] An improvement on strong-password authentication protocols
    Chang, YF
    Chang, CC
    EMBEDDED SOFTWARE AND SYSTEMS, PROCEEDINGS, 2005, 3820 : 629 - 637
  • [24] Security Analysis and Improvement of Fingerprint Authentication for Smartphones
    Jo, Young-Hoo
    Jeon, Seong-Yun
    Im, Jong-Hyuk
    Lee, Mun-Kyu
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [25] The improvement of extraction method for noncontact fingerprint authentication
    Torii, Keita
    Okamoto, Noriyoshi
    IEEJ Transactions on Electronics, Information and Systems, 2006, 126 (08) : 972 - 979
  • [26] AN IMPROVEMENT OF REMOTE AUTHENTICATION AND KEY AGREEMENT SCHEMES
    Lee, Cheng-Chi
    Li, Chun-Ta
    Huang, Kuo-You
    Huang, Shiow-Yuan
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2011, 20 (04) : 697 - 707
  • [27] An improvement of mobile users authentication in the integration environments
    Hwang, Min-Shiang
    Lee, Cheng-Chi
    Yang, Wei-Pang
    AEU-Archiv fur Elektronik und Ubertragungstechnik, 2002, 56 (05): : 293 - 297
  • [28] The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol
    Park, Yong-Seok
    Kim, Choon-Soo
    Ryou, Jae-Cheol
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1469 - 1473
  • [29] IMPROVEMENT OF SESSION AUTHENTICATION PROTOCOL FOR WEB SERVICES
    Tang Weidong
    Li Qiang
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 929 - 936
  • [30] An Improvement on RFID Authentication Protocol with Privacy Protection
    Lee, Y. -C.
    Hsieh, Y. -C.
    You, P-S.
    Chen, T. -C.
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 569 - +