期刊文献+
共找到81篇文章
< 1 2 5 >
每页显示 20 50 100
多天线频谱共享CR-NOMA系统安全中断性能分析
1
作者 吕铄 嵇建波 《电子测量技术》 北大核心 2023年第17期71-78,共8页
认知无线电(CR)非正交多址接入(NOMA)网络(记为CR-NOMA)已是无线通信领域的研究热点之一。由于无线信道的开放性,使得无线网络的安全通信成为当前急需解决的问题。该文研究了频谱共享多天线CR-NOMA网络安全中断性能,首先分析了最优天线... 认知无线电(CR)非正交多址接入(NOMA)网络(记为CR-NOMA)已是无线通信领域的研究热点之一。由于无线信道的开放性,使得无线网络的安全通信成为当前急需解决的问题。该文研究了频谱共享多天线CR-NOMA网络安全中断性能,首先分析了最优天线选择(OAS)方案的安全中断概率(SOP),并推导了其精确的闭合表达式。其次,分析了空时传输(STT)方案的SOP,并推导了其精确的闭合表达式。最后,对次用户两种方案的SOP渐近性能进行了分析,揭示了系统参数对SOP的影响。最后,采用Monte Carlo仿真验证了理论分析的正确性。研究发现,两种方案基站分别存在一个最优峰值发射功率,使得远距离次用户的安全中断性能最佳。仿真结果表明增大基站峰值发射功率,OAS方案的近距离次用户的SOP会始终优于STT方案,远距离次用户的SOP会劣于STT方案。 展开更多
关键词 认知无线电 非正交多址接入 安全中断性能 安全中断概率
下载PDF
水晶论坛(WDB)安全性分析
2
作者 Jambalaya 《黑客防线》 2004年第07S期23-26,共4页
WEB应用程序的安全越来越受到大家的关注,随之而来的就是各种免费代码程序的漏洞爆发。DVBBS一阵风波过后,很多站长开始选择PHP论坛,尤其是很多安全网站都开始变成了PHP,而PHP代码的编写者在编译器和MYSQL功能限制的保护下,很多得... WEB应用程序的安全越来越受到大家的关注,随之而来的就是各种免费代码程序的漏洞爆发。DVBBS一阵风波过后,很多站长开始选择PHP论坛,尤其是很多安全网站都开始变成了PHP,而PHP代码的编写者在编译器和MYSQL功能限制的保护下,很多得以蒙混过关。其实不安全就是不安全,也许在某个地方编译器和MYSQL可以作为“防弹衣”,但那并不是全部…… 展开更多
关键词 计算机网络 网络安全 应用程序 水晶论坛 )安全性分析
原文传递
CAUSALITY DIAGRAM BASED SAFETY ANALYSIS OF MICRO TURBOJET ENGINE 被引量:4
3
作者 丁水汀 鲍梦瑶 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2011年第3期262-268,共7页
An improved safety analysis based on the causality diagram for the complex system of micro aero-engines is presented.The study is examined by using the causality diagram in analytical failure cases due to rupture or p... An improved safety analysis based on the causality diagram for the complex system of micro aero-engines is presented.The study is examined by using the causality diagram in analytical failure cases due to rupture or pentration in the receiver of micro turbojet engine casing,and the comparisons are also made with the results from the traditional fault tree analysis.Experimental results show two main advantages:(1)Quantitative analysis which is more reliable for the failure analysis in jet engines can be produced by the causality diagram analysis;(2)Graphical representation of causality diagram is easier to apply in real test cases and more effective for the safety assessment. 展开更多
关键词 micro turbojet engines safety analysis causality diagram fault tree analysis FAILURE
下载PDF
Driving Behavior Shaping Model in Road Traffic System 被引量:2
4
作者 王武宏 《Journal of Beijing Institute of Technology》 EI CAS 2001年第3期331-336,共6页
In order to give a new way for modeling driving behavior, identifying road traffic accident causation and solving a variety of road traffic safety problems such as driving errors prevention and driving behavior analys... In order to give a new way for modeling driving behavior, identifying road traffic accident causation and solving a variety of road traffic safety problems such as driving errors prevention and driving behavior analysis, a new driving behavior shaping model is proposed, which could be used to assess the degree of effect of driving error upon road traffic safety. Driver behavior shaping model based on driving reliability and safety analysis could be used to identify the road traffic accident causation, to supply data for driver's behavior training, to evaluate driving procedures, to human factor design of road traffic system. 展开更多
关键词 driving errors driving behavior shaping factors driving reliability and safety analysis road traffic safety
下载PDF
Analyzing the safety of removal sequences for piles of an offshore jacket platform
5
作者 潘新颖 张兆德 《Journal of Marine Science and Application》 2009年第4期311-315,共5页
An inevitable consequence of the development of the offshore petroleum industry is the eventual obsolescence of large offshore structures. Proper methods for removal of decommissioned offshore platforms are becoming a... An inevitable consequence of the development of the offshore petroleum industry is the eventual obsolescence of large offshore structures. Proper methods for removal of decommissioned offshore platforms are becoming an important topic that the oil and gas industry must pay increasing attention to. While removing sections from a decommissioned jacket platform, the stability of the remaining parts is critical The jacket danger indices D ~ and Ds defined in this paper are very useful for analyzing the safety of any procedure planned for disassembling a jacket platform. The safest piles cutting sequence can be determined easily by comparing every column of Do and Ds or simply analyzing the figures of every row ofD o and D,. 展开更多
关键词 jacket platform REMOVAL safety analysis STRESS
下载PDF
Establishment of the Basic Theory of Fuze Safety Systems
6
作者 范宁军 马宝华 《Journal of Beijing Institute of Technology》 EI CAS 1993年第2期153-160,共8页
Presents a series of new concepts and design ideas about the fuze safety system, establishing thereby a proposed theory and relevant mathematical descriptions. The basic the- ory indicates that any fuze safety system ... Presents a series of new concepts and design ideas about the fuze safety system, establishing thereby a proposed theory and relevant mathematical descriptions. The basic the- ory indicates that any fuze safety system is a physical system comprising finite safety ele- ments each of which can independently affect the system's states, and the arming process is a dynamic one in which the extent of safety of the system changes only gradually. The theory and method can be used to analyse the arming process and to guide the development of fuze safety systems. 展开更多
关键词 FUZE fuze safety systems analysis / safety and arrming system
下载PDF
Study of a Comprehensive Assessment Method for Coal Mine Safety Based on a Hierarchical Grey Analysis 被引量:26
7
作者 LIU Ya-jing MAO Shan-jun +1 位作者 LI Mei YAO Ji-ming 《Journal of China University of Mining and Technology》 EI 2007年第1期6-10,共5页
Coal mine safety is a complex system, which is controlled by a number of interrelated factors and is difficult to estimate. This paper proposes an index system of safety assessment based on correlated factors involved... Coal mine safety is a complex system, which is controlled by a number of interrelated factors and is difficult to estimate. This paper proposes an index system of safety assessment based on correlated factors involved in coal mining and a comprehensive evaluation model that combines the advantages of the AHP and a grey clustering method to guarantee the accuracy and objectivity of weight coefficients. First, we confirmed the weight of every index using the AHP, then did a general safety assessment by means of a grey clustering method. This model analyses the status of mining safety both qualitatively and quantitatively. It keeps management and technical groups informed of the situation of the coal production line in real time, which aids in making correct decisions based on practical safety issues. A case study in the application of the model is presented. The results show that the method is applicable and realistic with regard to the core of a coal mine's safety management. Consequently, the safe production of a mine and the awareness of advanced safe production management is accelerated. 展开更多
关键词 safety of coal mine safety assessment index system hierarchical grey analysis
下载PDF
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
8
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution "Ping-pong" protocol extended three-particle GHZ state eavesdropping detection
下载PDF
Chaotic Image Encryption Algorithm by Correlating Keys with Plaintext 被引量:6
9
作者 Zhu Congxu Sun Kehui 《China Communications》 SCIE CSCD 2012年第1期73-79,共7页
A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process... A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications. 展开更多
关键词 skew tent map chaotic system image encryption secure corrrrmnieation
下载PDF
Toward an RSU-unavailable Lightweight Certificateless Key Agreement Scheme for VANETs 被引量:5
10
作者 SONG Jun HE Chunjiao +2 位作者 ZHANG Lei TANG Shanyu ZHANG Huanguo 《China Communications》 SCIE CSCD 2014年第9期93-103,共11页
Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks con... Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme. 展开更多
关键词 vehicle ad-hoc network securityand privacy lightweight authentication certificateless key agreement
下载PDF
Feasibility and safety of autologous bone marrow mononuclear cell transplantation in patients with advanced chronic liver disease 被引量:22
11
作者 Andre Castro lyra Milena Botelho Pereira Soares +9 位作者 luiz Flavio Maia da Silva Marcos Fraga Fortes André Goyanna Pinheiro Silva Augusto César de Andrade Mota Sheilla A Oliveira Eduardo lorens Braga Wilson Andrade de Carvalho Bernd Genser Ricardo Ribeiro dos Santos luiz Guilherme Costa lyra 《World Journal of Gastroenterology》 SCIE CAS CSCD 2007年第7期1067-1073,共7页
AIM: To evaluate the safety and feasibility of bone marrow cell (BMC) transplantation in patients with chronic liver disease on the waiting list for liver transplantation. METHODS: Ten patients (eight males) wit... AIM: To evaluate the safety and feasibility of bone marrow cell (BMC) transplantation in patients with chronic liver disease on the waiting list for liver transplantation. METHODS: Ten patients (eight males) with chronic liver disease were enrolled to receive infusion of autologous bone marrow-derived cells. Seven patients were classified as Child-Pugh B and three as Child-Pugh C. Baseline assessment included complete clinical and laboratory evaluation and abdominal MRI. Approximately 50 mL of bone marrow aspirate was prepared by centrifugation in a ficoll-hypaque gradient. At least of 100 millions of mononuclear-enriched BMCs were infused into the hepatic artery using the routine technique for arterial chemoembolization for liver tumors. Patients were followed up for adverse events up to 4 mo. RESULTS: The median age of the patients was 52 years (range 24-70 years). All patients were discharged 48 h after BMC infusion. Two patients complained ofmild pain at the bone marrow needle puncture site. No other complications or specific side effects related to the procedure were observed. Bilirubin levels were lower at 1 (2.19 ± 0.9) and 4 mo (2.10 ± 1.0) after cell transplantation that baseline levels (238 ± 1.2). Albumin levels 4 mo after BMC infusion (3.73 ± 0.5) were higher than baseline levels (3.47 ± 0.5). International normalized ratio (INR) decreased from 1.48 (SD = 0.23) to 1.43 (SD = 0.23) one month after cell transplantation. CONCLUSION: BMC infusion into hepatic artery of patients with advanced chronic liver disease is safe and feasible. In addition, a decrease in mean serum bilirubin and INR levels and an increase in albumin levels are observed. Our data warrant further studies in order to evaluate the effect of BMC transplantation in patients with advanced chronic liver disease. 展开更多
关键词 Bone marrow Cell transplantation Liverfailure Stem cell CIRRHOSIS
下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
12
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
下载PDF
Multiparty Quantum Secret Sharing Using Quantum Fourier Transform 被引量:3
13
作者 HUANG Da-Zu CHEN Zhi-Gang GUO Ying 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第2期221-226,共6页
A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encode... A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation. 展开更多
关键词 quantum secret sharing quantum Fourier transform quantum error correction code
下载PDF
Secure Network Coding Based on Lattice Signature 被引量:2
14
作者 SHANG Tao PEI Hengli LIU Jianwei 《China Communications》 SCIE CSCD 2014年第1期138-151,共14页
To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- u... To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- ure network coding algorithms. Firstly, by means of the distance between the message and its sig- nature in a lattice, we propose a Distance-bas- ed Secure Network Coding (DSNC) algorithm and stipulate its security to a new hard problem Fixed Length Vector Problem (FLVP), which is harder than Shortest Vector Problem (SVP) on lattices. Secondly, considering the bound- ary on the distance between the message and its signature, we further propose an efficient Bo- undary-based Secure Network Coding (BSNC) algorithm to reduce the computing complexity induced by square calculation in DSNC. Sim- ulation results and security analysis show that the proposed signature schemes have stronger unforgeability due to the natural property of lattices than traditional Rivest-Shamir-Adleman (RSA)-based signature scheme. DSNC algo- rithm is more secure and BSNC algorithm greatly reduces the time cost on computation. 展开更多
关键词 secure network coding pollution attack lattice signature fixed length vector problem
下载PDF
Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing 被引量:6
15
作者 Zhihua Xia Liangao Zhang Dandan Liu 《China Communications》 SCIE CSCD 2016年第7期92-99,共8页
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies... Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation. 展开更多
关键词 access control ABE efficient revocation removing escrow cloud computing
下载PDF
Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS 被引量:1
16
作者 肖跃雷 王育民 庞辽军 《China Communications》 SCIE CSCD 2013年第7期85-92,共8页
The TNC IF-T Protocol Binding to TLS(TIPBT) is specified by Trusted Computing Group(TCG) for TNC assessment exchanges.However,the TIPBT cannot be analysed by current Strand Space Model(SSM) because of the different re... The TNC IF-T Protocol Binding to TLS(TIPBT) is specified by Trusted Computing Group(TCG) for TNC assessment exchanges.However,the TIPBT cannot be analysed by current Strand Space Model(SSM) because of the different requirements from the traditional security protocols.In order to solve this problem,first,we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle(MITM) attacks in some cases based on the extended SSM.Then,we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM. 展开更多
关键词 computer application MITM attacks SSM TIPBT
下载PDF
Safety analysis of building foundations over old goaf under additional stress from building load and seismic actions 被引量:5
17
作者 Xu Ping Mao Xianbiao +2 位作者 Zhang Minxia Zhou Yuejin Yu Bangyong 《International Journal of Mining Science and Technology》 SCIE EI 2014年第5期713-718,共6页
Additional displacement of the building foundations over old goaf are prone to happen under the addi- tional loads induced by new buildings, weakening-rock mass by mining and seismic actions, which will cause serious ... Additional displacement of the building foundations over old goaf are prone to happen under the addi- tional loads induced by new buildings, weakening-rock mass by mining and seismic actions, which will cause serious damage to the buildings. In order to analyze the safety of the building foundations safety over the old goaf. the structure characteristics of the strata over the old goaf was investigated and the instability conditions of overhanging rocks upon old goaf were also analyzed in this paper. The results indicate that the stability of overhanging rocks is remarkably decreased by the interactions of mining fractures, earthquake force and building load, in addition, the settlement of the foundations over old goal is increased by the instability of overhanging rocks. According to the location of a new power plant in Yima Mine and its ambient conditions, we defined the influence scope of old goal via resistivity tomography. Based on the seismic parameters of the construction site, a numerical FLAC3d model of the building foundation under the seismic actions and building load was developed. The numerical results are obtained as follows: the foundation of the main power house meets the requirement of 6° seismic fortification intensity: however, under 7° seismic fortification intensity, the maximum differential settlement of foundation between the neighboring pillars is close to the maximum allowable value, while the seismic fortification intensity reaches 8°, but the safety requirements will not be satisfied. 展开更多
关键词 Seismic actions Additional stress Old goaf Foundation Settlement
下载PDF
Improved slope safety analysis by new Druker-Prager type criterion 被引量:1
18
作者 朱俊高 彭凯 +1 位作者 J.F.Shao 刘汉龙 《Journal of Central South University》 SCIE EI CAS 2012年第4期1132-1137,共6页
Based on Mohr-Coulomb (M-C) criterion, the parameters of Druker-Prager (D-P) criterion for geomaterial were determined under non-associated flow rule, and thus a new D-P type criterion was presented. Two assumptio... Based on Mohr-Coulomb (M-C) criterion, the parameters of Druker-Prager (D-P) criterion for geomaterial were determined under non-associated flow rule, and thus a new D-P type criterion was presented. Two assumptions were employed during the derivation: 1) principal strains by M-C model and D-P model are equal, and 2) the material is under plane strain condition. Based on the analysis of the surface on rt plane, it is found that the proposed D-P type criterion is better than the D-P criterion with M-C circumscribed circle or M-C inscribed circle, and is applicable for stress Lode angle less than zero. By comparing the predicted results with the test data of sand under plane strain condition and other D-P criteria, the proposed criterion is verified and agrees well with the test data, which is further proved to be better than other D--P type criteria in certain range of Lode angle. The criterion was compiled into a finite difference package FLAC3D by user-subroutine, and was used to analyze the stability of a slope by strength reduction method. The predicted slope safety factor from the proposed criterion agrees well with that by Spencer method, and it is more accurate than that from classic D-P criteria. 展开更多
关键词 yield criterion non-associated flow rule dilatancy angle plastic potential function
下载PDF
Security Analysis and Enhanced Design of a Dynamic Block Cipher 被引量:3
19
作者 ZHAO Guosheng WANG Jian 《China Communications》 SCIE CSCD 2016年第1期150-160,共11页
There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution o... There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement. 展开更多
关键词 cryptography block cipher encryption algorithm safety analysis
下载PDF
Security Analysis and Improvement of Authentication Scheme Based on a One-way Hash Function and Diffie-Hellman Key Exchange Using Smart Card 被引量:1
20
作者 Kang-seok CHAE Dai-hoon KIM +1 位作者 Jae-duck CHOI Souh-wan JUNG 《Journal of Measurement Science and Instrumentation》 CAS 2010年第4期360-363,共4页
A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing a... A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing attack. In this paper, the author demonstrate that Yoon's scheme is vulnerable to the off-line password guessing attack by using a stolen smart card and the DoS attack by computational load at the re, note system. An improvement of Yoon's scheme to resist the above attacks is also proposed. 展开更多
关键词 AUTHENTICATION guessing attack DIFFIE-HELLMAN smart card
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部