2014
DOI: 10.4304/jnw.9.2.339-343
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Trusted Computing Model for Network Security Authentication

Abstract: Network information poses great threats from malicious attacks due to the openness and virtuality of network structure. Traditional methods to ensure information security may fail when both integrity and source authentication for information are required. Based on the security of data broadcast channel, a novel Trusted Computing Model (TCM) of network security authentication is proposed to enhance the security of network information. In this model, a method of Uniform content locator security Digital Certifica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…16 It has been deployed in the asymmetric information sharing network and network security. 17,18 The SOL indicates the location of the OLTEs that store the requested contents, which is critical for data routing. The AF and SOL are all first introduced in this article for content storing and searching.…”
Section: Service Storage Principlementioning
confidence: 99%
“…16 It has been deployed in the asymmetric information sharing network and network security. 17,18 The SOL indicates the location of the OLTEs that store the requested contents, which is critical for data routing. The AF and SOL are all first introduced in this article for content storing and searching.…”
Section: Service Storage Principlementioning
confidence: 99%
“…Note that in order to protect the security of wireless channel between the terminal and the center, encryption methods are to be adopted. We have researched the asymmetric channel in our previous work and its detail is referred to [23,24]. The database, which stores the authentication benchmarks, receives the authentication information from the TCA center periodically.…”
Section: The Asymmetric Wireless Communication Channelmentioning
confidence: 99%