基于移动端协助的硬口令认证密钥交换协议

徐渊 - 计算机应用研究, 2020 - arocmag.com
authenticated key exchange protocol based on mobilesecurity of the user's secret information.
Meanwhile, the proposed protocol can resist dictionary attacks, man-in-the-middle attacks

一种适用于高并发场景的基于SM2 协作签名算法身份鉴别方案

钱文飞, 王平建, 贾世杰, 张琼露, 陈天宇, 牛莹姣 - 信息安全学报, 2023 - jcs.iie.ac.cn
… in mobile services and solve the security problems … man-in-the-middle combination attacks.
Finally, this paper designs and implements a prototype SM2 collaborative signature login

边缘计算中移动终端安全高效认证协议

薛建彬, 白子梅 - 北京邮电大学学报, 2021 - journal.bupt.edu.cn
… complexity of the mobile terminal in the authentication process,and completes the mutual …
the security features of forward security,anti-replay attacks,and anti-man-in-the-middle attacks. …

一种基于加密哈希的端口地址跳变通信自同步机制

Y Luo, B Wang, X Wang, B Zhang, A Yue-bin Luo… - Frontiers, 2017 - jzus.zju.edu.cn
… as well as perform message authentication over unreliable … schemes in terms of both
security and hopping efficiency. … 的方法能有效防御中间人(man-in-the-middle, MITM)攻击和网络…

基于LPN 抗中间人攻击的两轮认证协议

姜晓, 马昌社 - 华南师范大学学报(自然科学版), 2016 - journal-n.scnu.edu.cn
… pmVide strong security guamntees for low cost devices such as … round symmetric
authentication protocol LPNAP which is able to resist maninthemiddle(MIM)attacks.LPNAP …

接入层信令安全研究.

李贵勇, 吴妙灵, 黄俊霖, 何沛… - Journal of Chongqing …, 2022 - search.ebscohost.com
… The scheme attracts the target terminal to man in the middle system, at the … a basis for
improving mobile network performance. Keywords:… Secure remote state estimation against linear …

Efficient pairing 鄄based batch anonymous authentication scheme for VANET

S Cheng, Z Mingyue, P Weiping - jcupt.bupt.edu.cn
… system, TA is required to store the privacy information for all authenticated vehicles,
generating the overall security parameters. In general, vehicle manufacturer or transportation …

基于椭圆曲线的强壮高效口令认证密钥协商方案

刘天华, 朱宏峰, 潘正祥 - 应用科学学报, 2012 - jas.shu.edu.cn
… tributed or portable terminals (eg, cell phone, PDA, and notebook PC). In electronic …
break secure one-way hash functions to get the information of k and secret x. 8) Man-in-the-middle

面向移动付费电视系统中访问控制的一对多认证协议

D He, N Kumar, H Shen, JH Lee - Science China Information Sciences, 2016 - Springer
… many authentication scheme for access control in mobile pay-TV systems, which is provably
secure in … Man-in-the-middle attack. The above discussion shows that the proposed scheme …

电子车钥匙环境下的口令认证密钥交换协议

明悦, 邹俊伟, 沈婷 - 北京航空航天大学学报, 2021 - bhxb.buaa.edu.cn
… the security model show that the protocol can resist dictionary attacks, man-in-the-middle
attacks, replay attacks, … A new password authentication method based on fingerprint and mobile