首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于角色授权的秘密更新算法
引用本文:詹旭,雷跃荣,谢千河,孙立碰.基于角色授权的秘密更新算法[J].成都信息工程学院学报,2008,23(4):367-369.
作者姓名:詹旭  雷跃荣  谢千河  孙立碰
作者单位:1. 四川理工学院电子与信息工程系,四川,自贡,643000
2. 成都信息工程学院,四川,成都,610225
3. 太原卫星发射中心,山西,太原,036301
摘    要:研究了Ad hoc密钥更新以及角色授权算法,提出了一种基于角色授权的密钥更新算法方案,有效地防止了密钥更新时遭受的主动攻击以及被动攻击。

关 键 词:AD  Hoc  密钥更新  角色授权算法

Re-keying algorithm based on role authorization in Ad hoc network
ZHAN Xu,LEI Yue-rong,XIE Qian-he,SUN Li-peng.Re-keying algorithm based on role authorization in Ad hoc network[J].Journal of Chengdu University of Information Technology,2008,23(4):367-369.
Authors:ZHAN Xu  LEI Yue-rong  XIE Qian-he  SUN Li-peng
Institution:ZHAN Xu1,LEI Yue-rong2,XIE Qian-he3,SUN Li-peng3 (1.Dept.of Electronics & Information Engineering,SUSE,Zigong 643000,China,2.Chengdu Umiversity of Information Technology,Chengdu 610225,Chia,3.Satellite Lawnch Center,Taiyan 036301,China)
Abstract:The re-keying algorithms in the Ad hoc network are studied comprehensively.An re-keying algorithm based on the role authorization in the Ad hoc network is given.It depresses the security threat by the authorization assault through importing the role authorization restricted in the access control.
Keywords:Ad hoc
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号