- 1、本文档共12页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Key establishment protocols for secure mobile communications A selective survey文档
Key Establishment Protocols for Secure Mobile
Communications: A Selective Survey
Colin BoydI and Anish Mathuria2
Information Security Research Centre, School of Data Communications
Queensland University of Technology,Brisbane Q4001 AUSTRALIA
boyd@f it. qut. edu. au
2 IBM Research, Tokyo Research Laboratory
1623-14, Shimotsuruma, Yamato-shi
Kanagawa-ken 242-0001 JAPAN
anish@trl, ibm. co. jp
Abstract. We analyse several well-known key establishment protocols
for mobile communications. The protocols are examined with respect
to their security and suitability in mobile environments. In a number
of cases weaknesses are pointed out, and in many cases refinements are
suggested, either to improve the efficiencyor to allow simplified security
analysis.
1 I n t r o d u c t i o n
Security is a critical issue in mobile radio applications, both for the users and
providers of such systems. Although the same may be said of all communica-
tions systems, mobile applications have special requirements and vulnerabilities,
and are therefore of special concern. Once a call has been set up by establishing
various security parameters, the problem is reduced to that of employing appro-
priate cryptographic algorithms to provide the required security services. The
most important problem is undoubtedly that of designing protocols for authen-
tication and key management as part of the call set-up process; security-critical
errors made at this stage will undermine the security of the whole of the session,
and possibly subsequent sessions as well.
The problem of designi
您可能关注的文档
- java学生信息管理系统源代码(毕业设计).pdf
- Java常见问题笔试面试题.pdf
- JSP动态网站开发案例教程 教学课件 ppt 作者 刘素芳_ppt 第3章 JSP语法.pdf
- JSW J-EⅡ系列注塑成形机操作、保养技术培训课本.pdf
- Kalman Filtering - Second Edition III文档.pdf
- john hull risk management and financial institutions second edition文档.pdf
- Knowledge Transformation and Economic Development The Role of Digital Technology- An Analys文档.pdf
- K线图经典图解:75个K线组合图解分析(二).pdf
- Knowledge, attitude and practices for design for safety A study on civil structural engineers文档.pdf
- Laminate Materials and Reliability Issues for Pb-free Electronics文档.pdf
- 2025年数字货币对金融行业创新生态圈的构建与影响报告.docx
- 物流园区仓储设施2025年初步设计评估及智能化应用报告.docx
- 直播平台内容监管2025:自律发展路径与政策分析报告.docx
- 金融行业反洗钱技术前沿动态,2025年监管机制创新与合规要求前瞻报告.docx
- 绿色建筑认证体系在绿色建筑行业绿色建筑项目绿色建筑行业标准与规范报告.docx
- 短视频平台内容监管与行业自律机制构建报告.docx
- 2025年3D打印技术在航空航天零件大规模生产中的轻质高强材料应用报告.docx
- 农业灌溉用水高效利用与农村水资源保护研究报告.docx
- 2025年煤炭清洁燃烧技术产业政策与法规研究报告.docx
- 文化创意产品开发资金申请政策解读与市场布局报告.docx
最近下载
- 铁路局招聘考试《铁路基础知识》100题及答案.docx
- 《QSY1237-2009-工艺和设备变更管理》.pdf
- 期末复习专项训练【实验题】(试题)小学科学五年级上册 教科版.docx VIP
- 农旅融合:推进乡村振兴,实现双赢.docx VIP
- 技术标书技术方案(完整资料).pdf VIP
- 13G311-1:混凝土结构加固构造.pdf VIP
- DB21_T 1565-2015预应力混凝土管桩基础技术规程.pdf
- 夏季防暑降温施工方案_夏季防暑降温施工方案夏季防暑降温工作方案.pdf VIP
- 危重症患者口渴的护理PPT.pptx
- 八年级人教版物理下《12.2滑轮》一等奖优秀教学设计 .pdf VIP
文档评论(0)