An authentication and encryption scheme of network management message based on device fingerprint

被引:0
|
作者
Zhang, Dengyin [1 ]
Xu, Jinlian [2 ]
Cheng, Chunling [2 ]
Xue, Qinghan [2 ]
机构
[1] Key Lab of Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Ministry of Education, Nanjing 210003, China
[2] College of Computer, Nanjing University of Posts and Telecommunications, Ministry of Education, Nanjing 210003, China
关键词
D O I
10.3923/itj.2013.1206.1212
中图分类号
学科分类号
摘要
引用
收藏
页码:1206 / 1212
相关论文
共 50 条
  • [1] The fingerprint identity-based encryption scheme based on IBE and fingerprint authentication
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    Beijing Youdian Daxue Xuebao, 2006, SUPPL. 2 (19-23+29):
  • [2] A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication
    Yang, Yijun
    Yu, Jianping
    Zhang, Peng
    Wang, Shulan
    COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE, 2015, 2015
  • [3] A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA
    Zhu, Lijuan
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2471 - 2474
  • [4] THREE-FACTOR AUTHENTICATION SCHEME BASED ON SEARCHABLE ENCRYPTION AND BIOMETRIC FINGERPRINT
    Mihailescu, Marius Iulian
    Nita, Stefania Loredana
    2020 13TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2020, : 139 - 144
  • [5] Encryption scheme with mixed homomorphic signature based on message authentication for digital image
    Yang, Jing
    Fan, Mingyu
    Wang, Guangwei
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (02): : 1201 - 1211
  • [6] A face authentication-based searchable encryption scheme for mobile device
    Yue, Xiaohan
    Yi, Gang
    Si, Haoran
    Yang, Haibo
    Bai, Shi
    He, Yuan
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (01):
  • [7] ID-based authentication scheme combined with identity-based encryption with fingerprint hashing
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
    不详
    J. China Univ. Post Telecom., 2008, 4 (75-80,120):
  • [9] The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme
    Simplicio, Marcos A., Jr.
    Barbuda, Pedro d'Aquino F. F. S.
    Barreto, Paulo S. L. M.
    Carvalho, Tereza C. M. B.
    Margi, Cintia B.
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 165 - 180
  • [10] Chaotic Encryption for Fingerprint Authentication
    Aarthi, N. Ganitha
    Jeyaseelan, W. R. Salem
    Oviya, K.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2019, 12 (02): : 70 - 75