|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
Verification of Trusted Network Access Protocols in the Strand Space Model
Yuelei XIAO Yumin WANG Liaojun PANG
Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Vol.E95-A
No.3
pp.665-668 Publication Date: 2012/03/01 Online ISSN: 1745-1337
DOI: 10.1587/transfun.E95.A.665 Print ISSN: 0916-8508 Type of Manuscript: LETTER Category: Cryptography and Information Security Keyword: trusted network access, Strand Space Model, internal penetrator,
Full Text: PDF(146.6KB)>>
Summary:
Trusted network access protocols are proposed for the security and authorization of network-access requests. Because they differ greatly from traditional security protocols on security demands, they can not be analyzed with previous strand space works directly. To solve this problem, we first give some extensions necessary to verify them in this letter. Moreover, we point out Zhuo Ma et al.'s MN-TAP protocol is unsecure based on the Strand Space Model (SSM), and then improve the MN-TAP protocol and show that the improved MN-TAP protocol is secure in the SSM.
|
|