Resource Type

Journal Article 13

Year

2023 1

2021 1

2020 1

2019 2

2017 1

2015 1

2010 1

2008 1

2006 1

2005 2

2004 1

open ︾

Keywords

802.11i 1

Eospalax baileyi 1

Panthera pardus 1

Authentication 1

Authority trust level 1

Bellare-Rogaway model 1

Bit-wise chosen-plaintext 1

CBC - MAC mode 1

CCM mode 1

CTR mode 1

Chameleon hash function 1

Correlation power attack 1

Digital signature 1

Double-authentication-preventing signatures 1

HMAC-SM3 1

IEEE 802.16 1

Image secret sharing 1

Lossless decoding 1

PMAC mode 1

open ︾

Search scope:

排序: Display mode:

A lightweight authentication scheme with user untraceability

Kuo-Hui YEH

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 4,   Pages 259-271 doi: 10.1631/FITEE.1400232

Abstract: To guarantee robust security and computational efficiency for service retrieval, a variety of authenticationRecently, Chang (2014) introduced a formally provable secure authentication protocol with the propertyA security enhanced authentication scheme is proposed to eliminate all identified weaknesses.

Keywords: Authentication     Privacy     Security     Smart card     Untraceability    

Parallel Authentication Modes Based on Double Blocks or Key Counter

Huang Yuhua,Huai Aiqun,Song Yubo

Strategic Study of CAE 2004, Volume 6, Issue 7,   Pages 70-74

Abstract: A parallel authentication mode (PKCB) based on double blocks was put forward in this paper.The PKCB mode had a marked improvement on security & speed over parallel authentication mode, PMACOn this ground, another parallel authentication mode (KCTR - MAC) based on key counter was advanced.The KCTR - MAC authentication mode may be combined with the CTR (counter) encryption mode to form a full

Keywords: authentication mode     CBC - MAC mode     PMAC mode     CTR mode     CCM mode    

Molecular authentication of the traditional Chinese medicine Tongren Dahuoluo Wan and its alternative

Jikun WANG, Jing DU, Meng CAO, Lu YAO, Suhua XIE, Jiafu CHEN, Xingbo ZHAO

Frontiers of Agricultural Science and Engineering 2017, Volume 4, Issue 3,   Pages 353-357 doi: 10.15302/J-FASE-2017157

Abstract: For the patent medicine authentication, we set up a molecular diagnostic assay to resolve the difficultiesWe recommend a common technical strategy for authentication of species origins in traditional Chinese

Keywords: Tongren Dahuoluo Wan     molecular diagnostic assay     Eospalax baileyi     Panthera pardus     species-specific primers    

IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication

Wang Xingjian,Hu Aiqun,Huang Yuhua

Strategic Study of CAE 2006, Volume 8, Issue 9,   Pages 69-73

Abstract: Aimed at the weakness both in security and efficiency of one-hop one-way authentication SA (securityassociation) mechanism employed by Mesh network, an multi-hops mutual authentication SA mechanism associated

Keywords: IEEE 802.16     mesh     node     multi-hops mutual authentication     self-modified routing    

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Research Article

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 1,   Pages 88-103 doi: 10.1631/FITEE.2200118

Abstract: information, authenticate the shadow image mainly during the decoding phase, also known as unidirectional authenticationThe authentication of the shadow image in the distributing (encoding) phase is also important for the

Keywords: Image secret sharing     Shadow image authentication     Public key     Pixel expansion     Lossless decoding    

The Research and Implementation of WAPI Authentication on WLAN Access Point

Song Yubo,Yang Xiaohui,Hu Aiqun,Wang Zhili

Strategic Study of CAE 2005, Volume 7, Issue 9,   Pages 65-69

Abstract: characteristic and the basic framework of the WAPI standard, the detail of the application of the WAPI authenticationFurthermore, the performance of the authentication procedure was discussed.

Keywords: WLAN     WAPI     test analysis    

Double-authentication-preventing signatures revisited: new definition and construction from chameleon None

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 176-186 doi: 10.1631/FITEE.1700005

Abstract:

Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICSThe double-authentication-preventing property means that any pair of signatures on two different messages

Keywords: Double-authentication-preventing signatures     Chameleon hash function     Digital signature     Provable security    

The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network

Cao Ping,Pei Wenjiang

Strategic Study of CAE 2005, Volume 7, Issue 12,   Pages 78-82

Abstract:

Since the LEAP wireless authentication protocol is vulnerable to dictionary attacks, the flexibleauthentication via secure tunneling (EAP - FAST) was introduced by Cisco Corporation in 2004, which establishesa mutually authenticated protected tunnel to protect the authentication data.

Keywords: public wireless local area network     port based network access control (802.1x)     flexible authentication    

The Design on the Security Architecture of Public WLAN Based on Access Controller Mode

Song Yubo, Huai qun, Yang Xiaohui

Strategic Study of CAE 2008, Volume 10, Issue 8,   Pages 56-59

Abstract: style="text-align: justify;">The security problem, such as network security, user data protection, authenticationFurthermore, a compound 802.1x and WEB authentication scheme is provided to ensures cryptographically

Keywords: public WLAN     security architecture     authentication     access controller    

Developing Medical Examiner Offices in China: Necessity and Administration Mode

Song Suimin, Ma Chunling, Li Shujin, Cong Bin

Strategic Study of CAE 2020, Volume 22, Issue 4,   Pages 154-160 doi: 10.15302/J-SSCAE-2020.04.022

Abstract: the reform of the judicial system in China and improving the unified management system for judicial authenticationof forensic identification is the top priority to establish a unified management system for judicial authenticationThe medical examiner offices should be responsible for judicial authentication, scientific research,

Keywords: the administration of judicial authentication     bureau of medical examiner     administration mode     social governance    

Rapid Authentication of the Poisonous Plant Gelsemium elegans by Combining Filter-Paper-Based

Xiasheng Zheng, Wenli An, Hui Yao, Jiang Xu, Shilin Chen

Engineering 2021, Volume 7, Issue 1,   Pages 14-16 doi: 10.1016/j.eng.2020.02.012

The provable security formal analysis of 802.11i authentication scheme

Song Yubo,Hu Aiqun,Yao Bingxin

Strategic Study of CAE 2010, Volume 12, Issue 1,   Pages 67-73

Abstract: In 802.11i, 802.1x standard is used for the authentication and access controll.By utilizing the expanded Bellare-Rogaway model, a flaw has been found in 802.1X authentication protocols

Keywords: 802.11i     Bellare-Rogaway model     provable security     formal analysis    

Correlation power attack on amessage authentication code based on SM3 Research Articles

Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7,   Pages 930-945 doi: 10.1631/FITEE.1800312

Abstract:

Hash-based message authentication code (HMAC) is widely used in authentication and message integrity

Keywords: HMAC-SM3     Side channel analysis     Correlation power attack     Bit-wise chosen-plaintext    

Title Author Date Type Operation

A lightweight authentication scheme with user untraceability

Kuo-Hui YEH

Journal Article

Parallel Authentication Modes Based on Double Blocks or Key Counter

Huang Yuhua,Huai Aiqun,Song Yubo

Journal Article

Molecular authentication of the traditional Chinese medicine Tongren Dahuoluo Wan and its alternative

Jikun WANG, Jing DU, Meng CAO, Lu YAO, Suhua XIE, Jiafu CHEN, Xingbo ZHAO

Journal Article

IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication

Wang Xingjian,Hu Aiqun,Huang Yuhua

Journal Article

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Journal Article

The Research and Implementation of WAPI Authentication on WLAN Access Point

Song Yubo,Yang Xiaohui,Hu Aiqun,Wang Zhili

Journal Article

Double-authentication-preventing signatures revisited: new definition and construction from chameleon

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Journal Article

The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network

Cao Ping,Pei Wenjiang

Journal Article

The Design on the Security Architecture of Public WLAN Based on Access Controller Mode

Song Yubo, Huai qun, Yang Xiaohui

Journal Article

Developing Medical Examiner Offices in China: Necessity and Administration Mode

Song Suimin, Ma Chunling, Li Shujin, Cong Bin

Journal Article

Rapid Authentication of the Poisonous Plant Gelsemium elegans by Combining Filter-Paper-Based

Xiasheng Zheng, Wenli An, Hui Yao, Jiang Xu, Shilin Chen

Journal Article

The provable security formal analysis of 802.11i authentication scheme

Song Yubo,Hu Aiqun,Yao Bingxin

Journal Article

Correlation power attack on amessage authentication code based on SM3

Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG

Journal Article