원문정보
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
This work scrutinizes an active network scenario and proposes an efficient dual authentication key exchanged. The scheme protects personal privacy of identity information. It also provides an effective method to protect against DOS attacks with the scope information of initiator’s random number table sent by the responder.
목차
Abstract
1. Introduction
2. Wireless Communication
2.1 Scenario
2.2 Attacks in Wireless Communication
2.3 Malignant code and Worm
3. Preceding Authentication Method
4. Suggested Authentication Method
5. Proposed Key Exchange in Authentication Mechanism
5.1 Model and Notation
5.2 One-Time-ID(OID)
5.3 Phases
6. Analysis
7. Conclusion
References
1. Introduction
2. Wireless Communication
2.1 Scenario
2.2 Attacks in Wireless Communication
2.3 Malignant code and Worm
3. Preceding Authentication Method
4. Suggested Authentication Method
5. Proposed Key Exchange in Authentication Mechanism
5.1 Model and Notation
5.2 One-Time-ID(OID)
5.3 Phases
6. Analysis
7. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보
