完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Lin, Chih-Hsing | |
dc.contributor.author | Twu, Shih-Hsiung | |
dc.date.accessioned | 2009-08-23T04:41:17Z | |
dc.date.accessioned | 2020-05-25T06:37:56Z | - |
dc.date.available | 2009-08-23T04:41:17Z | |
dc.date.available | 2020-05-25T06:37:56Z | - |
dc.date.issued | 2006-10-16T03:22:52Z | |
dc.date.submitted | 2002-12-18 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/1415 | - |
dc.description.abstract | In this paper, we propose three new authentication mechanisms based on Asymmetric-key cryptosystems. The three authentication protocols are designed based on the security requirements of the third generation mobile communication systems, which is proposed by UMTS. The advantages of the Asymmetric-key cryptosystems are to solve a very important key management problem for key distribution. Besides, it can provide non-repudiation for the part of the transmitted data. Therefore, we adopt the Asymmetric-key cryptosystems to design our authentication schemes. The characteristic of the first schemes is that the User and the Network Operator have the public keys from each other, respectively. The characteristic of the second schemes is that we exploit the exchange of certificate to achieve the goal of exchange of the public key between the User and the Network Operator. The characteristic of the third schemes is that the Network Operator can obtain the public key from the User’s certificate sent by Certificate Server. Similarly, the User can obtain the public key from the Network Operator that is sent be Certificate Server. The proposed authentication protocols for 3G mobile communication systems are analyzed to be correct to achieve the critical goals of the requirements of security and threats, and these protocols are efficient and effective because they are computationally low complexity and are simple but secure enough. | |
dc.description.sponsorship | 東華大學,花蓮縣 | |
dc.format.extent | 20p. | |
dc.format.extent | 126190 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | zh_TW | |
dc.relation.ispartofseries | 2002 ICS會議 | |
dc.subject | Authentication Protocol | |
dc.subject | 2G | |
dc.subject | 3G | |
dc.subject | Cryptography | |
dc.title | Authentication Protocol for 3G Mobile Communication Systems | |
分類: | 2002年 ICS 國際計算機會議 |
文件中的檔案:
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
ce07ics002002000196.PDF | 123.23 kB | Adobe PDF | 檢視/開啟 |
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。