The paper considers the peculiarities of authentication in multi-tier environment and corresponding security problems. The authentication protocol for multi-tier system based on commutative encryption is provided. Also, some specific commutative encryption algorithms are considered.
Download file
Counter downloads: 71
- Title AUTHENTICATION IN TRUSTED SUBSYSTEM MODEL USING COMMUTATIVE ENCRYPTION.
- Headline AUTHENTICATION IN TRUSTED SUBSYSTEM MODEL USING COMMUTATIVE ENCRYPTION.
- Publesher
Tomsk State University
- Issue Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics 3(9)
- Date:
- DOI
Keywords
многоуровневые системы, аутентификация в многоуровневых системах, коммутативное шифрование, multi-tier systems, authentication in multi-tier systems, commutative encryptionAuthors
References
Bao F., Deng R. H., Feng P. An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods // LNCS. 2001. V.2015. P. 162-170.
Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Second Edition. Wiley, 1996. 785 p.
Chong F. Trusted Subsystem Design // MSDN. 2006. <http://msdn.microsoft.com/en-us/>library/aa905320.aspx
Паутов П. А. Проблема аутентификации в многоуровневых приложениях // Прикладная дискретная математика. 2008. №2. С. 87-90.

AUTHENTICATION IN TRUSTED SUBSYSTEM MODEL USING COMMUTATIVE ENCRYPTION. | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2010. № 3(9).
Download full-text version
Download fileCounter downloads: 206