Liming Hao

Learn More
In this paper, we propose a group-based trust model named F-PKI (Freely organized one level Public Key Infrastructure) in P2P system based on Trusted Computing (TC) technology which is used to enhance PC security by incorporating hardware platform. In this model, peers are organized freely by group, each of which is a one level PKI. Preliminary evaluation(More)
Public key certificate is the prerequisite for proving identity authentication between mobile ad hoc networks (MANET) nodes. However, for MANET's dynamic topologies and infrastructure-less that brings the challenges for public key verification, similarly in hierarchical public key infrastructure (PKI) in MANET. In this paper, we propose a fast(More)
Trustworthiness of resources is the foundation of virtual computing environments (VCE). Using identical information of resource is an ordinate method to achieve trustworthiness. However, it may conflict with identity privacy problem, an important security issue in VCE, that tries to make resource anonymous. A trust model is proposed to enhance(More)
EAP-AKA is the extensible authentication protocol (EAP) mechanism for authentication and key distribution using the authentication and key agreement (AKA) mechanism used in the 3<sup>rd</sup> generation mobile networks. The improved authentication tests model is a formal verification method for security protocol analysis, which enhances the original(More)
  • 1