Trusted Inter-Domain Fast Authentication Protocol in Split Mechanism Network

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and analysis on trusted network equipment access authentication protocol

Cloud security is a system engineering problem. A common approach to address the problem is to adapt existing Trusted Network Connection (TNC) framework in the cloud environment, which can be used to assess and verify end clients’ system state. However, TNC cannot be applied to network equipment attached to the cloud computing environment directly. To allow the network devices to access the tru...

متن کامل

Topology Construction for Inter-Domain Network Protocol Simulations

Inter-domain network protocol simulations are often resource-demanding. A reduction of the inter-domain topology size can make the simulations more tractable. However, the simulations must yield results that are applicable to the real system. In this report, we describe a procedure for selecting a topology suitable for simulations of global, inter-domain protocols in the Internet. The procedure...

متن کامل

An Improved Authentication Protocol Without Trusted Third Party∗

This letter presents a secure authentication protocol which supports both the privacy of messages and the authenticity of the communicating parties. A scheme for extending a secure authentication protocol to improve the security of the communicating parties is also proposed.

متن کامل

Unified Authentication Scheme Based on IBE in Trusted Network

The existing unified authentication schemes are based on Public Key Infrastructure (PKI)/Privilege Management Infrastructure (PMI), WS-Security, Kerberos etc. But they can't support the developing Trusted Network Connect (TNC) environment. To solve the problem, a unified authentication scheme supporting multi-authentication modes based on Identity-Based Encryption (IBE) in trusted network named...

متن کامل

Identity-based Trusted Authentication in Wireless Sensor Network

Secure communication mechanisms in Wireless Sensor Networks (WSNs) have been widely deployed to ensure confidentiality, authenticity and integrity of the nodes and data. Recently many WSNs applications rely on trusted communication to ensure large user acceptance. Indeed, the trusted relationship thus far can only be achieved through Trust Management System (TMS) or by adding external security ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEICE Transactions on Information and Systems

سال: 2012

ISSN: 0916-8532,1745-1361

DOI: 10.1587/transinf.e95.d.2728