检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:S.Shanmuga Priya D.Yuvaraj T.Satyanarayana Murthy Varghese S.Chooralil S.Navaneetha Krishnan P.Banumathy P.SundaraVadivel
机构地区:[1]Department of Computer Science and Engineering,M.I.E.T Engineering College,Trichy,Tamilnadu,India [2]Department of Computer Science and Engineering,Cihan University,Duhok,Kurdistan Region,Iraq [3]Department of Computer Science and Engineering,Bapatla Engineering College,Bapatla,Andhra Pradesh,India [4]Department of Computer Science and Engineering,Rajagiri School of Engineering and Technology,Kakkanad,Kerala,India [5]Department Electronics and Communication Engineering,SACS MAVMM Engineering College,Madurai,Tamilnadu,India [6]Department of Information Technology,Karaikal Polytechnic College,Varichikudy-Karaikal,India [7]Department of Computer Science and Engineering,SACS MAVMM Engineering College,Madurai,India
出 处:《Computer Systems Science & Engineering》2022年第12期887-896,共10页计算机系统科学与工程(英文)
摘 要:Authentication is important to the security of user data in a mobilecloud environment. Because of the server’s user credentials, it is subject toattacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC)by producing a secret number that isn’t stored in the phone, which protects againstprivileged insider attacks. The user and server generate a nonce for dynamic useridentity and agree on a session secret key for safe communication. The passwordsare not stored on the computer or provided in plain text, they are resistant toreplay, guessing, and stolen verification attacks. The suggested protocol uses aone-way hash function and XOR operations, with the client having remote accessto a large number of servers over a secure communication channel. Concentrateson HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hashwould make it substantially more difficult to break via a rainbow table.
关 键 词:Registration center SIM IMEI
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.63