首页> 外文期刊>IEICE Transactions on Information and Systems >Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer network
【24h】

Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer network

机译:分布式计算机网络中两种带有用户认证的访问控制方案的密码分析和改进

获取原文
获取原文并翻译 | 示例
       

摘要

In 1998, Jan and Tseng Proposed two inte- grated schemes of user authentication and access control which can be used to implement a protection system in distributed computer systems. This paper will analyze the security of both schemes and show that an intruder can easily forge a login, be accepted an logged in as a legal user, and access system re- sources. We will then propose a modified scheme to withstand our proposed attacks.
机译:1998年,Jan和Tseng提出了两种集成的用户身份验证和访问控制方案,可用于在分布式计算机系统中实现保护系统。本文将分析这两种方案的安全性,并表明入侵者可以轻松地伪造登录名,被接受为合法用户登录名以及访问系统资源。然后,我们将提出一种经过改进的方案来抵抗我们提出的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号