Full metadata record
DC FieldValueLanguage
dc.contributor.authorShieh, Shiuh-Pyngen_US
dc.contributor.authorYang, Wen-Heren_US
dc.contributor.authorSun, Hun-Minen_US
dc.date.accessioned2014-12-08T15:01:49Z-
dc.date.available2014-12-08T15:01:49Z-
dc.date.issued1997-05-01en_US
dc.identifier.issn1089-7798en_US
dc.identifier.urihttp://dx.doi.org/10.1109/4234.585805en_US
dc.identifier.urihttp://hdl.handle.net/11536/579-
dc.description.abstractA secure authentication protocol which supports both the privacy of messages and the authenticity of communicating parties is proposed. The trusted third party (key information center) is not needed once the secure network system is set up. Mutual authentication and key distribution can be achieved with two messages merely between two parties involved.en_US
dc.language.isoen_USen_US
dc.subjectAuthentication protocolen_US
dc.subjectID-based schemeen_US
dc.titleAn Authentication Protocol Without Trusted Third Partyen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/4234.585805en_US
dc.identifier.journalIEEE COMMUNICATIONS LETTERSen_US
dc.citation.volume1en_US
dc.citation.issue3en_US
dc.citation.spage87en_US
dc.citation.epage89en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
Appears in Collections:Articles


Files in This Item:

  1. 000207086700009.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.