{"title":"通过WLAN/蜂窝双网络进行身份验证的公钥分发","authors":"Jing-Shyang Hwu, Rong-Jaye Chen, Yi-Bing Lin","doi":"10.1109/ITRE.2005.1503107","DOIUrl":null,"url":null,"abstract":"Public-key cryptosystems are characterized by the use of two keys, one held privately and the other available publicly. The main concern in a public-key setting is the authenticity of the public key. This authentication problem is typically resolved by the use of verifiable information called certificate, which is issued by a trusted third party and consists of the user name and his public key. The integrated WLAN/cellular networks enable simultaneous access to both cellular network and wireless LAN. This paper proposes a certificate-free public-key distribution scheme over WLAN/cellular dual networks.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Authenticated public-key distribution over WLAN/cellular dual networks\",\"authors\":\"Jing-Shyang Hwu, Rong-Jaye Chen, Yi-Bing Lin\",\"doi\":\"10.1109/ITRE.2005.1503107\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Public-key cryptosystems are characterized by the use of two keys, one held privately and the other available publicly. The main concern in a public-key setting is the authenticity of the public key. This authentication problem is typically resolved by the use of verifiable information called certificate, which is issued by a trusted third party and consists of the user name and his public key. The integrated WLAN/cellular networks enable simultaneous access to both cellular network and wireless LAN. This paper proposes a certificate-free public-key distribution scheme over WLAN/cellular dual networks.\",\"PeriodicalId\":338920,\"journal\":{\"name\":\"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-06-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITRE.2005.1503107\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITRE.2005.1503107","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authenticated public-key distribution over WLAN/cellular dual networks
Public-key cryptosystems are characterized by the use of two keys, one held privately and the other available publicly. The main concern in a public-key setting is the authenticity of the public key. This authentication problem is typically resolved by the use of verifiable information called certificate, which is issued by a trusted third party and consists of the user name and his public key. The integrated WLAN/cellular networks enable simultaneous access to both cellular network and wireless LAN. This paper proposes a certificate-free public-key distribution scheme over WLAN/cellular dual networks.