Please use this identifier to cite or link to this item:
http://dspace.cityu.edu.hk/handle/2031/401
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hu, Chunyan (胡春燕) | |
dc.date.accessioned | 2006-01-20T01:41:56Z | |
dc.date.accessioned | 2017-09-19T08:26:52Z | |
dc.date.accessioned | 2019-01-22T03:40:36Z | - |
dc.date.available | 2006-01-20T01:41:56Z | |
dc.date.available | 2017-09-19T08:26:52Z | |
dc.date.available | 2019-01-22T03:40:36Z | - |
dc.date.issued | 2005 | |
dc.identifier.other | 2005cshcy465 | |
dc.identifier.other | cs2005-4512-hcy465 (OAPS) | |
dc.identifier.uri | http://144.214.8.231/handle/2031/401 | - |
dc.description | Nominated as OAPS (Outstanding Academic Papers by Students) paper by Department in 2006-07. | |
dc.description.abstract | User privacy, which concerns about compromising the identities of network users and tracking user’s movement and whereabouts, has become one of the big issues in network especially wireless networks along with the increased requirement of user mobility and sensitive data application. An Anonymous Authenticated Key Exchange for Roaming (AAKE-R) which involves a user and two servers, namely a home server and a foreign server, is an authenticated key exchange scheme, which achieves user anonymity and user untraceability by keeping user’s identity secret from any other third party except home server. This scheme also manages to carry out authenticated key exchange between the user and the foreign server with the contribution of home server, at the same time, makes the session key unobtainable for the home server to achieve the data privacy. This project will provide an instance of AAKE-R protocol with the consideration of key-privacy, real-time run environment, and computational constraints. Moreover, a PC-based application will be built to verify the correctness and realistic of the protocol. | en |
dc.format.extent | 164 bytes | |
dc.format.mimetype | text/html | |
dc.rights | This work is protected by copyright. Reproduction or distribution of the work in any format is prohibited without written permission of the copyright owner. | |
dc.rights | Access is restricted to CityU and other institutions for the purpose of scholarly communication. | |
dc.subject | Computer security | |
dc.subject | Cryptography | |
dc.subject | Public key cryptography | |
dc.subject | Data encryption | |
dc.title | Traveling incognito | en |
dc.contributor.department | Department of Computer Science | en |
dc.description.course | CS4512 | |
dc.description.programme | BSCS/BSCCS | |
dc.description.supervisor | Prof. Deng, Xiaotie. First Reader: Dr. Wan, Pengjun. Second Reader: Dr. Chun, H W Andy | en |
Appears in Collections: | Computer Science - Undergraduate Final Year Projects OAPS - Dept. of Computer Science |
Files in This Item:
File | Size | Format | |
---|---|---|---|
fulltext.html | 162 B | HTML | View/Open |
Items in Digital CityU Collections are protected by copyright, with all rights reserved, unless otherwise indicated.