期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Security analysis of newly ameliorated WAPI protocol 被引量:3
1
作者 庞辽军 李慧贤 王育民 《Journal of Southeast University(English Edition)》 EI CAS 2008年第1期25-28,共4页
Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is ... Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security. 展开更多
关键词 wireless local area network (WLAN) WLAN authentication and privacy infrastructure (WAPI) AUTHENTICATION key negotiation CK model
下载PDF
视觉词语识别任务下左右脑功能网络局部形态的分化 被引量:1
2
作者 张笑非 杨阳 钟宁 《北京工业大学学报》 CAS CSCD 北大核心 2022年第7期773-782,共10页
为研究任务态下视觉词语识别时左右脑功能网络之间的拓扑形态差异,使用OpenfMRI开放项目“词语与对象处理”的45名被试tfMRI数据,分别构造单词条件和辅音字符串条件下基于解剖学脑图自动解剖标记(automated anatomical labelling, AAL)... 为研究任务态下视觉词语识别时左右脑功能网络之间的拓扑形态差异,使用OpenfMRI开放项目“词语与对象处理”的45名被试tfMRI数据,分别构造单词条件和辅音字符串条件下基于解剖学脑图自动解剖标记(automated anatomical labelling, AAL)的左右脑功能网络,对2个半脑的度中心性、全局效率、聚类系数和局部效率进行统计对比,并考察AAL的兴趣点(region of interest, ROI)与功能脑图Willard-499语言网络的关系. 2种实验条件下左右脑网络指标在稀疏度定义域差异均有统计学意义,其中辅音字符串实验条件下4个指标统计学差异占比分别为0、0、0、0,单词条件下分别为0、5%、0、44%,单词条件下聚类系数与局部效率差异占比存在反差.左右脑功能网络在进行单词识别时存在局部形态的分化. 展开更多
关键词 视觉词语识别 任务诱发功能磁共振成像 脑功能网络 局部形态 视觉词形区 大脑图谱对比
下载PDF
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i
3
作者 韩玮 郑东 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期81-85,共5页
Temporal key integrity protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in wired equivalent privacy (WEP) protocol. TKIP adds four new algorithms to WEP: a message integrity co... Temporal key integrity protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in wired equivalent privacy (WEP) protocol. TKIP adds four new algorithms to WEP: a message integrity code (MIC) called Michael, an initialization vector (IV) sequencing discipline, a key mixing function and a reeying mechanism. The key mixing function, also called temporal key hash, de-correlates the IVs from weak keys. Some cryptographic properties of the substitution box (S-box) used in the key mixing function are investigated in this paper, such as regularity, avalanche effect, differ uniform and linear structure. Moen et al pointed out that there existed a temporal key recovery attack in TKIP key mixing function. In this paper a method is proposed to defend against the attack, and the resulting effect on performance is discussed. 展开更多
关键词 wireless local area network (WLAN) temporal key integrity protocol (TKIP) substitution box (S- box)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部