Rational analysis of authentication protocols based on NGUYEN L H scheme
Using the ideas of game theory,NGUYEN L H transformed two families of authentication protocols where the honest party transmitted some useless data with probability α before the normal protocol run,so that even if an attacker attacks a protocol,the attacker’s payoff will still be lower than that whe...
Saved in:
Main Authors: | Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2013-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.08.003/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Deniable authentication for multi-party protocol
by: Yong CHEN, et al.
Published: (2016-06-01) -
Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach
by: Li-cai LIU, et al.
Published: (2013-08-01) -
Design of anonymous authentication protocol for RFID
by: DENG Miao-lei, et al.
Published: (2009-01-01) -
Research of authentication techniques for the Internet of things
by: Hongqiang YAN, et al.
Published: (2020-07-01) -
Secure access authentication scheme for 4G wireless network based on PCL
by: Li-li WANG, et al.
Published: (2012-04-01)