Liming Hao

  • Citations Per Year
Learn More
Public key certificate is the prerequisite for proving identity authentication between mobile ad hoc networks (MANET) nodes. However, for MANET's dynamic topologies and infrastructure-less that brings the challenges for public key verification, similarly in hierarchical public key infrastructure (PKI) in MANET. In this paper, we propose a fast(More)
In this paper, we propose a group-based trust model named F-PKI (Freely organized one level Public Key Infrastructure) in P2P system based on Trusted Computing (TC) technology which is used to enhance PC security by incorporating hardware platform. In this model, peers are organized freely by group, each of which is a one level PKI. Preliminary evaluation(More)
Trustworthiness of resources is the foundation of virtual computing environments (VCE). Using identical information of resource is an ordinate method to achieve trustworthiness. However, it may conflict with identity privacy problem, an important security issue in VCE, that tries to make resource anonymous. A trust model is proposed to enhance(More)
EAP-AKA is the extensible authentication protocol (EAP) mechanism for authentication and key distribution using the authentication and key agreement (AKA) mechanism used in the 3<sup>rd</sup> generation mobile networks. The improved authentication tests model is a formal verification method for security protocol analysis, which enhances the original(More)
A new multi-signature scheme was proposed with the extension of the direct anonymous attestation (DAA) protocol supported by trusted computing (TC) technology. Analysis and simulation results show that the signer’s privacy is well protected with dynamic anonymity, the public key and signatures have length independent of the number of signature members, new(More)
A fully distributed exchange-based anonymity P2P reputation system—EARep was proposed. EARep can provide all the peer’s anonymity in a fully distributed structured manner. In EARep, each peer’s anonymity is achieved by changing pseudonyms. Analysis and simulation results showed that compared with DARep, which is an existing representative scheme, our system(More)
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without(More)