搜索结果: 1-14 共查到“AKA”相关记录14条 . 查询时间(0.031 秒)

New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
Key Agreement Mobile Communication Privacy, Attack
2018/12/3
Mobile communications are used by more than two thirds of the world population who expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) responsible for the worldwide s...
Proposed by the 3rd Generation Partnership Project (3GPP) as a standard for 3G and 4G mobile-network communications, the AKA protocol is meant to provide a mutually-authenticated key-exchange between ...
Secure communications between mobile subscribers and their associated operator networks require mutual authentication and key derivation protocols. The 3GPP standard provides the AKA protocol for just...
Cryptographic Analysis of the 3GPP AKA Protocol
AKA protocol AKE protocols provable security
2016/4/12
Secure communications between mobile subscribers and their associated operator networks require mutual authentication and key derivation protocols. The 3GPP standard provides the \aka\ protocol for ju...

美国人体运动学协会(American Kinesiology Association,AKA)(图)
美国人体运动学协会 American Kinesiology Association AKA
2012/2/28
The American Kinesiology Association promotes and enhances kinesiology as a unified field of study and advances its many applications. AKA does this by advocating for kinesiology at national and inter...
Weakness in an ECC-based AKA Protocol for Wireless Mobile Communications
Authenticated key agreement Off-line password guessing attack
2011/7/25
With the rapid progress of wireless mobile communication, the authenticated key agreement protocol has attracted an increasing amount of attention.
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
cryptographic protocols AKA (Authenticated Key Agreement) Key Exchange
2010/7/14
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely considered for new ap...
不同PKG环境下可证安全的基于身份AKA协议
密码学 认证密钥协商 基于身份 双线性对 不同PKG环境 Trapdoor test技术
2011/5/18
目前大多数基于身份认证密钥协商协议需要参与协议双方在同一个PKG环境下,而实际应用中需要在不同PKG环境下的用户之间也能进行安全通信。该文结合twin Diffie-Hellman问题提出了一个全新的不同PKG环境下的基于身份认证密钥协商协议。利用Cash等人在2008年欧密会上提出的“trapdoor test”技术在eCK模型中将新协议的安全性规约到标准的CDH和BDH 假设。
增强EAP-AKA协议安全性的改进方案
EAP-AKA 无线局域网络 串空间
2009/10/9
针对EAP-AKA协议中存在的安全问题,提出了改进方案。通过在3G和WLAN接入网络间增设共享密钥实现了两者间的相互认证,并用串空间模型和认证测试方法进行了形式化分析,通过加密传输NAI实现了对IMSI的加密保护,通过引入密钥更新机制实现了对用户和3G网络间的共享密钥的安全更新。

[aka maria x] Strategies of Sharing:the Case-study of Deptford.TV(图)
Case-study Deptford.TV
2009/7/15
p.s. You are personally invited to rewrite this essay
Watch the video-essay Strategies of Sharing (2006) at http://www.deptford.tv/bm/
Are you ready to share?
EAP-AKA(Extensible Authentication Protocol-Authentication and Key Agreement)是WLAN的认证和密钥分配协议;认证测试是一种以串空间理论为基础的安全协议分析验证方法。运用认证测试方法对EAP-AKA协议的双向身份认证过程进行了分析证明,结果说明EAP-AKA能够保证移动终端和认证服务器之间的双向认证。
...
3G与WLAN互连是当前研究的一个热点。EAPAKA是其对应的认证与密钥分配协议。详细分析EAP-AKA协议的流程和安全性,并针对其中的安全缺陷,提出一种改进的方案,同时对改进方案的安全性也进行了分析。
A Study on the Fishes of Edremit Bay (Aegean Sea) Hatice TORCU, Zeliha AKA
Fish species Systematic Edremit Bay
2010/3/31
This investigation was carried out for the determination of fish species living in Edremit Bay (Aegean Sea). Morphometric and meristic characters of fishes caught by trawl and various nets from five s...