助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   unknown key-share attack 的翻译结果: 查询用时:0.162秒
图标索引 在分类学科中查询
所有学科
电信技术
更多类别查询

图标索引 历史查询
 

unknown key-share attack
相关语句
  未知密钥共享攻击
     This protocol adopts a pseudo-random sequence to avoid the unknown key-share attack and the known-key attack.
     通过在密钥生成函数中引入伪随机数,防止了未知密钥共享攻击(the unknown key-share attack)和已知密钥攻击。
短句来源
  相似匹配句对
     The Unknown Brother
     失散的兄弟
短句来源
     Evidences are key;
     证据是关键 ;
短句来源
     The unknown female of X.
     首次报道并描述了X.
短句来源
     Key Words
     关键语
短句来源
     But some key factors which were still unknown impaired the development of the approach.
     然而调控柑橘愈伤组织再生的一些关键性因素尚未研究清楚,为这项技术的应用带来了诸多麻烦。
短句来源
查询“unknown key-share attack”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  unknown key-share attack
Zhouet al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack.
      


This paper proposes a pairing-based group key agreement protocol based on Shim's certification-based tripartite key agreement protocol. This protocol adopts a pseudo-random sequence to avoid the unknown key-share attack and the known-key attack. Some attacks described in the literatures are presented, which proved infeasible in the protocol. And this protocol can achieves the forward security and backward security, when a dynamic group performs it.

在Shim(2003)的基于证书的三方密钥协商协议的基础上提出了一个基于对的组密钥协商协议。通过在密钥生成函数中引入伪随机数,防止了未知密钥共享攻击(the unknown key-share attack)和已知密钥攻击。给出了当前文献中已知的一些攻击方法,并证明这些攻击方法在此协议中是无效的。同时此协议具有前向安全和后向安全的特性,即在动态组的情况下协议仍是安全的。

Deng, et al. proposed a security-provable mutually authenticated key agreement protocol MAKAP for mobile communication in 2003. This paper demonstrates by mounting an effective attack against MAKAP that the protocol has security flaws. It is vulnerable against unknown key-share attack. This paper investigates the reasons why such flaws exist and proposes an improved protocol version (called MAKAP-I protocol). The MAKAP-I protocol is not only provably secure within the random oracle model but also more...

Deng, et al. proposed a security-provable mutually authenticated key agreement protocol MAKAP for mobile communication in 2003. This paper demonstrates by mounting an effective attack against MAKAP that the protocol has security flaws. It is vulnerable against unknown key-share attack. This paper investigates the reasons why such flaws exist and proposes an improved protocol version (called MAKAP-I protocol). The MAKAP-I protocol is not only provably secure within the random oracle model but also more efficient and practical in terms of computation and communication cost memory requirement and implementation cost, than the original MAKAP protocol.

针对用于移动通信的可证安全的双向认证密钥协商协议MAKAP给出了一种有效攻击,指出该协议存在安全缺陷,它不能抵抗未知密钥共享攻击.分析了这些安全缺陷产生的原因,并给出了一种改进的协议MAKAP-I.改进后的MAKAP-I协议不但是可证安全的,而且无论从计算开销、通信开销、存储开销以及实现成本等方面,都比原MAKAP协议更高效、更实用.

 
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关unknown key-share attack的内容
在知识搜索中查有关unknown key-share attack的内容
在数字搜索中查有关unknown key-share attack的内容
在概念知识元中查有关unknown key-share attack的内容
在学术趋势中查有关unknown key-share attack的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社