共查询到20条相似文献,搜索用时 0 毫秒
1.
Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system efficiency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness. 相似文献
2.
简宏宇 《上海交通大学学报(英文版)》2014,19(4):436-439
Authenticated Diffie-Hellman key agreement is quite popular for establishing secure session keys. As resource-limited mobile devices arc becoming more popular and security threats are increasing, it is desirable to reduce computational load for these resource-limited devices while still preserving its strong security and convenience for users. In this paper, we propose a new smart-card-based user authenticated key agreement scheme which allows users to memorize passwords, reduces users' device computational load while still preserves its strong security. The proposed scheme effectively improves the computational load of modular exponentiations by 50%, and the security is formally proved. 相似文献
3.
In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually
form groups and cooperate with each other in sensing data collection and in-network processing. In this paper, we present
a scalable authenticated scheme for group key distribution based on a combinatorial exclusion basis system (EBS) for efficiency
and one-way hash chains for authentication. The proposed scheme guarantees a lightweight authenticated group key updating
procedure and is efficient in terms of storage, communication and computation overheads.
Foundation item: the National High Technology Research and Development Program (863) of China (Nos. 2006AA01Z436, 2007AA01Z455, and 2007AA01Z473). 相似文献
4.
As the wireless medium is characterized by its lossy nature, reliable communication cannot be as-sumed in the key management scheme. Therefore self-healing is a good property for key distribution scheme in wireless applications. A new self-healing key distribution scheme was proposed, which is optimal in terms of user memory storage and efficient in terms of communication complexity. 相似文献
5.
6.
7.
《西安交通大学学报(医学版)》2018,(2)
随着快速扫描序列的出现,胎儿磁共振迅速发展。磁共振检查因其软组织分辨率高,扫描视野大,在排除胎儿颅脑畸形方面较超声更具优势,因而成为越来越重要的产前筛查手段,具有广泛的临床应用前景。本文就胎儿颅脑磁共振的安全性、适应症、扫描序列、检查注意事项及临床应用等做一综述。 相似文献
8.
主要介绍构建电子商务的关键技术及安全,如电子商务的安全、电子认证、电子商务的支付技术、WEB浏览技术和数据库的技术及安全等。 相似文献
9.
10.
11.
This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks (WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds of wireless devices (or nodes). Individual node cooperates by forwarding packets to each other, allowing nodes to communicate beyond the symmetric or asymmetric links. Asymmetric link is a special feature of WMNs because the wireless transmission ranges of different wireless devices may be different. The asymmetric link enhances WMN coverage. Providing security in WMNs has become an important issue over the last few years. Existing research on this topic tends to focus on providing security for routing and data content in the symmetric link. However, most studies overlook the asymmetric link in these networks. This study proposes a novel distributed routing protocol beyond symmetric and asymmetric links, to guarantee the security and high reliability of the established route in a hostile environment, such as WMNs, by avoiding the use of unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than those in prior works. The major objective of the proposed protocol is to allow trustworthy intermediate nodes to participate in the path construction protocol. The mesh clients out of mesh router wireless transmission range may discover a secure route to securely connect to the mesh router for Internet access via the proposed protocol. The proposed protocol enhances wireless mesh network coverage and assures security. 相似文献
12.
胡树兵 《湖北汽车工业学院学报》1992,(2):64-66
本文在The Qvarnstorm公式的基础上提出了一种HRC与HV硬度相互换算的修正公式,按国家公布的黑色金属硬度标准数据进行换算,其计算的HRC误差值基本上在±0.4HRC范围内,很好地达到了硬度换算的精度要求。 相似文献
13.
简便实用的最小二乘预测算式 总被引:2,自引:0,他引:2
本文推导了在等间隔观测条件下的最小二乘预测的简例实用的预测算式,它可以利用前四点历史数据直接计算出下一观测点的预测值,因此能更加方便地在实时控制及其它领域中直接应用,对各种数据的动态趋势进行预测分析。 相似文献
14.
15.
通过对小跨径简支T梁的受力进行分析研究,分别对构件在承载能力极限状态下进行强度验算、在正常使用极限状态下进行刚度验算。与现有空心板进行对比,总结出小跨径简支T梁的优点,对今后推广小跨径简支T梁具有指导作用。 相似文献
16.
浅谈路基路面的排水设计 总被引:1,自引:0,他引:1
公路的排水系统是由地表排水、地下排水、路面内部排水等几部分组成的综合排水系统,从路基排水和路面排水两部分阐述了各种排水设计的适用条件. 相似文献
17.
18.
19.
AbstractA buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo’s scheme has two problems which would make it hard to implement practically. Several possible solutions to the two problems are presented in this paper. 相似文献
20.
吴承平 《重庆交通大学学报(自然科学版)》2001,20(3):121-124
针对目前科技论文摘要和关键词编写中存在的问题 ,介绍了论文摘要的重要意义和分类 ,并着重介绍了摘要和关键词编写的要求及注意事项 . 相似文献