首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system efficiency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness.  相似文献   

2.
Authenticated Diffie-Hellman key agreement is quite popular for establishing secure session keys. As resource-limited mobile devices arc becoming more popular and security threats are increasing, it is desirable to reduce computational load for these resource-limited devices while still preserving its strong security and convenience for users. In this paper, we propose a new smart-card-based user authenticated key agreement scheme which allows users to memorize passwords, reduces users' device computational load while still preserves its strong security. The proposed scheme effectively improves the computational load of modular exponentiations by 50%, and the security is formally proved.  相似文献   

3.
In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processing. In this paper, we present a scalable authenticated scheme for group key distribution based on a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication. The proposed scheme guarantees a lightweight authenticated group key updating procedure and is efficient in terms of storage, communication and computation overheads. Foundation item: the National High Technology Research and Development Program (863) of China (Nos. 2006AA01Z436, 2007AA01Z455, and 2007AA01Z473).  相似文献   

4.
As the wireless medium is characterized by its lossy nature, reliable communication cannot be as-sumed in the key management scheme. Therefore self-healing is a good property for key distribution scheme in wireless applications. A new self-healing key distribution scheme was proposed, which is optimal in terms of user memory storage and efficient in terms of communication complexity.  相似文献   

5.
与世界上的许多城市相比,东京市现有的道路布局并不是最理想的.城里没有大路,能见到的立交桥也不多.即便核心区的很多干道,也仅仅是双向四车道.  相似文献   

6.
对目前高等级公路沥青混凝土桥面铺装病害及其原因进行了分析与研究,在设计及施工方面提出了一些防治措施,并着重对常见的几种防水层使用情况及对桥面铺装使用寿命的影响进行了论述,对桥梁设计与施工中合理选择防水层型式有一定的参考价值.  相似文献   

7.
随着快速扫描序列的出现,胎儿磁共振迅速发展。磁共振检查因其软组织分辨率高,扫描视野大,在排除胎儿颅脑畸形方面较超声更具优势,因而成为越来越重要的产前筛查手段,具有广泛的临床应用前景。本文就胎儿颅脑磁共振的安全性、适应症、扫描序列、检查注意事项及临床应用等做一综述。  相似文献   

8.
主要介绍构建电子商务的关键技术及安全,如电子商务的安全、电子认证、电子商务的支付技术、WEB浏览技术和数据库的技术及安全等。  相似文献   

9.
从对桥梁结构病害检测分析基础上,分清加固性质,明确加固目的,确定加固方法,并提出预应力主动加固技术是承载力加固的首选方案,阐述了高强复合纤维的材料在桥梁加固中的合理应用。  相似文献   

10.
浅谈桥梁的养护与管理   总被引:1,自引:0,他引:1  
着重阐述了加强公路桥梁养护的必要性,并对桥梁的养护管理提出相应措施.  相似文献   

11.
This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks (WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds of wireless devices (or nodes). Individual node cooperates by forwarding packets to each other, allowing nodes to communicate beyond the symmetric or asymmetric links. Asymmetric link is a special feature of WMNs because the wireless transmission ranges of different wireless devices may be different. The asymmetric link enhances WMN coverage. Providing security in WMNs has become an important issue over the last few years. Existing research on this topic tends to focus on providing security for routing and data content in the symmetric link. However, most studies overlook the asymmetric link in these networks. This study proposes a novel distributed routing protocol beyond symmetric and asymmetric links, to guarantee the security and high reliability of the established route in a hostile environment, such as WMNs, by avoiding the use of unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than those in prior works. The major objective of the proposed protocol is to allow trustworthy intermediate nodes to participate in the path construction protocol. The mesh clients out of mesh router wireless transmission range may discover a secure route to securely connect to the mesh router for Internet access via the proposed protocol. The proposed protocol enhances wireless mesh network coverage and assures security.  相似文献   

12.
本文在The Qvarnstorm公式的基础上提出了一种HRC与HV硬度相互换算的修正公式,按国家公布的黑色金属硬度标准数据进行换算,其计算的HRC误差值基本上在±0.4HRC范围内,很好地达到了硬度换算的精度要求。  相似文献   

13.
简便实用的最小二乘预测算式   总被引:2,自引:0,他引:2  
本文推导了在等间隔观测条件下的最小二乘预测的简例实用的预测算式,它可以利用前四点历史数据直接计算出下一观测点的预测值,因此能更加方便地在实时控制及其它领域中直接应用,对各种数据的动态趋势进行预测分析。  相似文献   

14.
钻孔灌注桩的施工及监理浅析   总被引:1,自引:0,他引:1  
从施工及监理的角度,较为详尽的阐述了钻孔灌注桩的施工技术及质量监理的要点,并对现阶段设计中存在的问题提出了意见。  相似文献   

15.
葛芸 《北方交通》2015,(1):17-20
通过对小跨径简支T梁的受力进行分析研究,分别对构件在承载能力极限状态下进行强度验算、在正常使用极限状态下进行刚度验算。与现有空心板进行对比,总结出小跨径简支T梁的优点,对今后推广小跨径简支T梁具有指导作用。  相似文献   

16.
浅谈路基路面的排水设计   总被引:1,自引:0,他引:1  
公路的排水系统是由地表排水、地下排水、路面内部排水等几部分组成的综合排水系统,从路基排水和路面排水两部分阐述了各种排水设计的适用条件.  相似文献   

17.
对混凝土常见裂缝的成因进行分析,并提出预防措施。  相似文献   

18.
桥梁安全事故浅析及其防治对策研究   总被引:5,自引:0,他引:5  
对一些重大桥梁安全事故进行了综述,并进行了事故原因分析。并在此基础上,探讨了减少桥梁安全事故的对策,可供桥梁管理部门参考。  相似文献   

19.
AbstractA buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo’s scheme has two problems which would make it hard to implement practically. Several possible solutions to the two problems are presented in this paper.  相似文献   

20.
针对目前科技论文摘要和关键词编写中存在的问题 ,介绍了论文摘要的重要意义和分类 ,并着重介绍了摘要和关键词编写的要求及注意事项 .  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号