AUTHENTICATION IN TRUSTED SUBSYSTEM MODEL USING COMMUTATIVE ENCRYPTION. | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2010. № 3(9).

The paper considers the peculiarities of authentication in multi-tier environment and corresponding security problems. The authentication protocol for multi-tier system based on commutative encryption is provided. Also, some specific commutative encryption algorithms are considered.
Download file
Counter downloads: 71
  • Title AUTHENTICATION IN TRUSTED SUBSYSTEM MODEL USING COMMUTATIVE ENCRYPTION.
  • Headline AUTHENTICATION IN TRUSTED SUBSYSTEM MODEL USING COMMUTATIVE ENCRYPTION.
  • Publesher Tomask State UniversityTomsk State University
  • Issue Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics 3(9)
  • Date:
  • DOI
Keywords
многоуровневые системы, аутентификация в многоуровневых системах, коммутативное шифрование, multi-tier systems, authentication in multi-tier systems, commutative encryption
Authors
References
Bao F., Deng R. H., Feng P. An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods // LNCS. 2001. V.2015. P. 162-170.
Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Second Edition. Wiley, 1996. 785 p.
Chong F. Trusted Subsystem Design // MSDN. 2006. <http://msdn.microsoft.com/en-us/>library/aa905320.aspx
Паутов П. А. Проблема аутентификации в многоуровневых приложениях // Прикладная дискретная математика. 2008. №2. С. 87-90.
 AUTHENTICATION IN TRUSTED SUBSYSTEM MODEL USING COMMUTATIVE ENCRYPTION. | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2010. № 3(9).
AUTHENTICATION IN TRUSTED SUBSYSTEM MODEL USING COMMUTATIVE ENCRYPTION. | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2010. № 3(9).