Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Huang Zhenhai is active.

Publication


Featured researches published by Huang Zhenhai.


international conference on wireless communications, networking and mobile computing | 2007

A Correctness Proof of WAPI Certificate Authentication Protocol

Tie Manxia; Li Jiandong; Huang Zhenhai; Wang Yu-min

WAPI certificate authentication protocol is the core and key component of WAPI security mechanism proposed by Chinese WLAN standard. This protocol adopts pubfic key cryptographic technique, ASUE (authentication supplicant entity) and AE (authenticator entity) implement the mutual identity authentication aided by their trusting third ASE (authentication security entity) to realize secure access and negotiate the corresponding BK. Using a formal logic of PCL, WAPI certificate authentication protocol is programmed and its security properties are proved. The results show that if all the entities involved in the protocol do not reveal their long-term keys or short-term keys, this protocol provides the properties of strong session authentication and key secrecy and achieves its predefined security goals.


Archive | 2011

METHOD FOR AUTHENTICATING ENTITIES BY INTRODUCING AN ON-LINE TRUSTED THIRD PARTY

Lai Xiaolong; Cao Jun; Tie Manxia; Xiao Yuelei; Huang Zhenhai


Archive | 2010

Method for providing special access process to different terminals in WLAN

Zhang Bianling; Yi Xing; Cao Jun; Ye Xumao; Huang Zhenhai; Wang Xuesong; Li Lin; Luo Xianlin; Yu Chuang; Lai Xiaolong


Archive | 2011

PLATFORM IDENTIFICATION IMPLEMENTATION METHOD AND SYSTEM SUITABLE FOR TRUSTED CONNECTION ARCHITECTURE

Xiao Yuelei; Cao Jun; Huang Zhenhai; Wang Ke; Zhang Guoqiang


Archive | 2011

MUTUAL AUTHENTICATION METHOD AND SYSTEM BASED ON IDENTITIES

Pang Liaojun; Cao Jun; Du Zhiqiang; Huang Zhenhai; Zhang Guoqiang; Wang Ke; Hu Yanan


Archive | 2014

Broadcast authentication method for wireless network with limited node resource

Du Zhiqiang; Cao Jun; Tie Manxia; Lai Xiaolong; Huang Zhenhai


Archive | 2014

Key distributing method and system using public key cryptographic technique

Tie Manxia; Lai Xiaolong; Cao Jun; Huang Zhenhai


Archive | 2011

Method and system for establishing secure connection between local area network nodes

Li Qin; Cao Jun; Tie Manxia; Huang Zhenhai


Archive | 2011

Secret communication method, terminal, switching equipment and system between neighboring user terminals

Li Qin; Cao Jun; Tie Manxia; Huang Zhenhai; Du Zhiqiang


Archive | 2010

METHOD FOR BROADCASTING AUTHENTICATION IN NODE-RESOURCE-LIMITED WIRELESS NETWORK

Du Zhiqiang; Cao Jun; Tie Manxia; Lai Xiaolong; Huang Zhenhai

Collaboration


Dive into the Huang Zhenhai's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge