中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [5]
长春光学精密机械与物... [2]
中国科学院大学 [1]
沈阳自动化研究所 [1]
采集方式
OAI收割 [8]
iSwitch采集 [1]
内容类型
会议论文 [7]
期刊论文 [2]
发表日期
2020 [1]
2010 [1]
2008 [2]
2006 [2]
2005 [1]
2004 [2]
更多
学科主题
Computer S... [1]
筛选
浏览/检索结果:
共9条,第1-9条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Authentication Technology in Industrial Control System Based on Identity Password
会议论文
OAI收割
Shenyang, China, July 27-29, 2020
作者:
Yang LY(杨路瑶)
;
Shang WL(尚文利)
;
Chen CY(陈春雨)
;
Wang TY(王天宇)
;
Liu ZB(刘周斌)
  |  
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2020/10/10
Industrial control security
digital signature
identity authentication
SSL/TLS handshake protocol
Authenticated group key transfer protocol based on secret sharing
期刊论文
iSwitch采集
Ieee transactions on computers, 2010, 卷号: 59, 期号: 6, 页码: 842-846
作者:
Harn, Lein
;
Lin, Changlu
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2019/05/10
Group key transfer protocol
Session key
Secret sharing
Confidentiality
Authentication
Alliance-oriented security architecture and technologies in collaborative e-commerce system (EI CONFERENCE)
会议论文
OAI收割
20th IASTED International Conference on Parallel and Distributed Computing and Systems, PDCS 2008, November 16, 2008 - November 18, 2008, Orlando, FL, United states
Si H.
;
Fang Z.
;
Yin Y.
;
Zhao H.
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2013/03/25
Collaborative commerce and design environment is characterized by of its numerous users
massive resources and dynamic change. In order to solve security problems coming from multi-domain
heterogeneity and dynamics
the security architecture for collaborative commerce and design environment was constructed throuth adoptting Internet Protocol Security(IPSec)
Secure Socket Layer(SSL)
Simple Object Access Protocol Security(SOAPSec). The enabling technologies including IPSec-based Virtual Private Net(VPN)
secure e-commence and cooperation framework
digital authentication and encryption of data were discussed in detail. The architecture and the enabling technologies provided the security mechanism amongst the partners to realize business collaboration
design collaboration in network business pattern.
A new authentication protocol for wireless communication network based on IEEE802.16 (EI CONFERENCE)
会议论文
OAI收割
2008 International Symposium on Parallel and Distributed Processing with Applications, ISPA 2008, December 10, 2008 - December 12, 2008, Sydney, NSW, Australia
Li R.
;
Fang Z.
;
Cao W.
;
Yin Y.
;
Xu P.
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2013/03/25
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16
a series of key issues about security methods and techniques were researched. A new authentication protocol for wireless mobile environment was proposed and designed. Then
its security was analyzed from the angle of technical realization and formal analysis to verify whether the original safety goals were achieved. Especially
formal analysis was mostly done. Finally
system testing was also carried out and the results were analyzed to verify function and performance of the new protocol. 2008 IEEE.
generalized unsolicited tests for authentication protocol analysis
会议论文
OAI收割
7th International Conference on Parallel and Distrubuted Computing, Applications and Technologies, Taipei, TAIWAN, DEC 04-07,
Li Yongjian
;
Pang Jun
  |  
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2011/07/28
strand space
authentication
cryptographic protocols
the Otway-Rees protocol
generalized unsolicited tests for authentication protocol analysis
会议论文
OAI收割
7th International Conference on Parallel and Distrubuted Computing, Applications and Technologies, Taipei, TAIWAN, DEC 04-07,
Li Yongjian
;
Pang Jun
  |  
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2011/07/28
strand space
authentication
cryptographic protocols
the Otway-Rees protocol
an efficient id-based deniable authentication protocol from pairings
会议论文
OAI收割
19th International Conference on Advanced Information Networking and Applications, Taipei, TAIWAN, MAR 28-30,
Cao TJ
;
Lin DD
;
Xue R
  |  
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2011/07/28
ID-based deniable authentication protocol
data privacy
data privacy
message authentication
protocols
a new cembs based on rsa signatures and its application in constructing fair exchange protocol
会议论文
OAI收割
IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE 2004), Taipei, TAIWAN, MAR 28-31,
Zhou YB
;
Zhang ZF
;
Qing SH
;
Liu J
  |  
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2011/07/29
RSA signatures
cryptographic primitive
digital signature
e-commerce protocols
encryption scheme
fair exchange protocol
security analysis
cryptography
electronic commerce
message authentication
new semantic model for authentication protocols in asms
期刊论文
OAI收割
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 卷号: 19, 期号: 4, 页码: 555-563
Xue R
;
Feng DG
  |  
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2011/07/29
cryptographic protocol
formal analysis
abstract state machine (ASM)
authentication protocol