Entity

Time filter

Source Type


Xiao Y.,Xian University of Posts and Telecommunications | Xiao Y.,Shaanxi Provincial Information Engineering Research Institute | Xiao Y.,Northwestern Polytechnical University | Zhu Z.,Xian University of Posts and Telecommunications | And 3 more authors.
Journal of Computational Information Systems | Year: 2015

To solve the problems of the existing robust remote attestation protocol, a new robust remote attestation protocol is proposed. This protocol performs mutual key confirmation, and implements both the key confirmation function and the remote attestation function in only three messages. Moreover, two kinds of trusted network access protocols are put forward because a trusted network access protocol based on a robust remote attestation protocol may still be unable to prevent masquerading attacks if it is not designed well. Lastly, the two kinds of trusted network access protocols are proved secure on basis of the extended Strand Space Model (SSM). ©, 2015, Journal of Computational Information Systems. All right reserved. Source


Xiao Y.,University of South China | Xiao Y.,Shaanxi Provincial Information Engineering Research Institute | Zhu Z.,University of South China | Zhu Z.,Shaanxi Provincial Information Engineering Research Institute | And 2 more authors.
ICIC Express Letters | Year: 2015

Transport Layer Security (TLS) provides privacy and data integrity between two communicating entities. However, it cannot support the mutual Platform- Authentication protocol based on the ISO/IEC 9798-3:1998/Amd 1:2010 well. To solve this problem, an Enhanced TLS (ETLS) protocol was proposed. This ETLS protocol can simultaneously establish three secure channels to support this mutual Platform- Authentication protocol, and is backward compatible with the TLS protocol. Moreover, the ETLS protocol is proved secure in the Strand Space Model (SSM). © ICIC International 2015. Source

Discover hidden collaborations