DOI
stands for Digital Object Identifier
(
D
igital
O
bject
I
dentifier
)
,
and is the unique identifier for objects on the internet. It can be used to create persistent link and to cite articles.
Using DOI as a persistent link
To create a persistent link, add「http://dx.doi.org/」
「
http://dx.doi.org/
」
before a DOI.
For instance, if the DOI of an article is
10.5297/ser.1201.002
, you can link persistently to the article by entering the following link in your browser:
http://dx.doi.org/
10.5297/ser.1201.002
。
The DOI link will always direct you to the most updated article page no matter how the publisher changes the document's position, avoiding errors when engaging in important research.
Cite a document with DOI
When citing references, you should also cite the DOI if the article has one. If your citation guideline does not include DOIs, you may cite the DOI link.
DOIs allow accurate citations, improve academic contents connections, and allow users to gain better experience across different platforms. Currently, there are more than 70 million DOIs registered for academic contents. If you want to understand more about DOI, please visit airiti DOI Registration ( doi.airiti.com ) 。
Communication Optimal Authenticated Key Agreements
李添福 , Ph.D Advisor:黃宗立
英文
金鑰交換 ; 網路安全 ; 通訊協定 ; network security ; authentication ; key agreement


- [1] L. Gong, “Lower bounds on messages and rounds for network authentication Protocols,” Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 26-37, Fairfax, Virginia, November 1993.
連結: - [2] L. Gong, “Efficient network authentication protocols: Lower bounds and implementations,” Distributed Computing, vol. 9, no. 3, pp. 131-145, 1995.
連結: - [4] L. Gong, “Optimal authentication protocols resistant to password guessing attacks,” Proceedings of the 8th IEEE Computer Security Foundation Workshop, pp. 24-29, 1995.
連結: - [5] T. Kwon and J. Song, “Authenticated key exchange protocols resistant to password guessing attacks,” IEE Proc.-Commun., vol. 145, no. 5, pp.304-308, 1998.
連結: - [6] T. Kwon, M. Kang and J. Song, “An adaptable and reliable authentication protocol for communication networks,” Proc. IEEE INFOCOM 97, Kobe, Japan, pp738-745, 1997.
連結: