期刊文献+

成长性身份认证 被引量:2

Growable Authentication
原文传递
导出
摘要 传统身份认证过程中所依据的主要是用户口令等相对固定的信息,本文提出了利用用户的系统行为信息进行身份认证的成长性身份认证的概念。与现有的身份认证机制相比,成长性身份认证可以解决密钥分发时的管理员漏洞,使侦听与监视、重放攻击等难以得手,有利于入侵检测,适用于对身份认证安全性要求较高的系统。 Relatively fixed information like password is mainly depended on in traditionalmethods of authentication while a new conceptofauthentication, which using information ofthe users behaviourin the system to authenticate, called Growable Authentication, is lodged in this paper. Compared withauthentication method nowadays,Growable Authentication could resolve the security problem with administrator when distributing the keys.Itmakes it harderto interception or watch, or replay an authentication. It is in favour of detecting inbreak, in point in the systems wich needs high security.
出处 《网络安全技术与应用》 2004年第12期27-29,共3页 Network Security Technology & Application
关键词 信息加密 信息安全 身份认证 用户口令 Growable Authentication security
  • 相关文献

参考文献4

二级参考文献12

  • 1[1]RSA Laboratories.PKCS#1:RSA Encryption Standard[S].NIST/OSI Implementor s Workshop document SEC-SIG-91-18
  • 2[2]FIPS PUB 186: Digital Signature Standard(DSS).Federal Information Pr ocessing Standards Publication[S]. May, 1994
  • 3[3]B.Kaliski,RFC1319:The MD2 Message-Digest Algorithm[S]. RSA Laboratories. Apri l 1992
  • 4[4]R.Rivest,RFC1320:The MD4 Message-Digest Algorithm[S]. MIT Laboratory f or Computer Science and Data Security, Inc. April 1992
  • 5[5]R.Rivest,RFC1321:The MD5 Message-Digest Algorithm[S]. MIT Laboratory f or Computer Science and Data Security, Inc. April 1992
  • 6[1][X509] ITU-T (formerly CCHT) Information technology-Open Systems Interconnection-The Directory: AuthenticationFramework Recommendation X.509[S] ISO/IEC 9594-8.
  • 7[2]Bruce Schneier. Applied Cryptography Protocols. Algorithms and Source Code in C[C]. John Wiley&Sons, Inc., 1994.
  • 8Haller N, The S/KEYTM One-Time Password System, Proceedings of the ISOC Symposium on Network and Distributed System Security,San Dielzo, CA, 1994:151-157.
  • 9Dhamija R, Perrig A, Vu D. A User Study Using Images for Authentication. In proceedings of the 9th Usenix Security Symposium, 2000.
  • 10Perrig A, Song D. Hash Visualization: A New Technique to Improve Real-world Security. In Proceedings of the 1999 International Work- shop on Cryptographic Techniques and E-commerce (CryTEC99), 1999.

共引文献14

同被引文献7

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部