透過您的圖書館登入
IP:3.17.162.247
  • 期刊

Formal Protocol Design of ESIKE Based on Authentication Tests

並列摘要


In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE) protocol. Then we formally prove the secure properties of ESIKE with strand space model and authentication tests. The ESIKE protocol overcomes the security shortages of the Internet Key Exchange (IKE), and can provide secure negotiation of session key and Security Association (SA), protection of endpoints' identities, and mutual authentication between the initiator and the responder. It needs only three messages and less computational load, so it is simple and efficient.

被引用紀錄


Su, W. T. (2014). 監督式人臉超解析度技術-人臉辨識與重建之應用 [master's thesis, National Tsing Hua University]. Airiti Library. https://doi.org/10.6843/NTHU.2014.00578
甘宗達(2017)。基於電化學阻抗譜建立電池模型參數量測系統設計〔碩士論文,國立虎尾科技大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0028-0708201720371300

延伸閱讀