Password authentication scheme for mobile computing environment
By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,t...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2007-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74659116/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537435127775232 |
---|---|
author | LIU Jun LIAO Jian-xin ZHU Xiao-min WANG Chun |
author_facet | LIU Jun LIAO Jian-xin ZHU Xiao-min WANG Chun |
author_sort | LIU Jun |
collection | DOAJ |
description | By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface.Moreover,the passwords in use could be changed by users without any interaction with servers over the radio.The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS. |
format | Article |
id | doaj-art-24148aafb4704f94941712871404e769 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2007-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-24148aafb4704f94941712871404e7692025-01-14T08:36:02ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2007-01-01364274659116Password authentication scheme for mobile computing environmentLIU JunLIAO Jian-xinZHU Xiao-minWANG ChunBy means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface.Moreover,the passwords in use could be changed by users without any interaction with servers over the radio.The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS.http://www.joconline.com.cn/zh/article/74659116/authenticationkey establishmentpasswordqueuing modelperformance analysisTLSRSA |
spellingShingle | LIU Jun LIAO Jian-xin ZHU Xiao-min WANG Chun Password authentication scheme for mobile computing environment Tongxin xuebao authentication key establishment password queuing model performance analysis TLS RSA |
title | Password authentication scheme for mobile computing environment |
title_full | Password authentication scheme for mobile computing environment |
title_fullStr | Password authentication scheme for mobile computing environment |
title_full_unstemmed | Password authentication scheme for mobile computing environment |
title_short | Password authentication scheme for mobile computing environment |
title_sort | password authentication scheme for mobile computing environment |
topic | authentication key establishment password queuing model performance analysis TLS RSA |
url | http://www.joconline.com.cn/zh/article/74659116/ |
work_keys_str_mv | AT liujun passwordauthenticationschemeformobilecomputingenvironment AT liaojianxin passwordauthenticationschemeformobilecomputingenvironment AT zhuxiaomin passwordauthenticationschemeformobilecomputingenvironment AT wangchun passwordauthenticationschemeformobilecomputingenvironment |