Direct anonymous authentication scheme for wireless networks under trusted computing

Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network ag...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG Li1, MA Jian-feng 1, PEI Qing-qi2, MA Zhuo 1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74646018/
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items