期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
MAC序列码雷达信号设计 被引量:5
1
作者 张登银 王汝传 王绍棣 《电子与信息学报》 EI CSCD 北大核心 2003年第12期1634-1640,共7页
该文对采用MAC序列码设计雷达信号的理论及方法作了系统研究.理论分析及实例仿真表明: MAC序列是具有理想相关特性和抗遮挡能力的二元序列,可以设计出具有无模糊测距、测速性能良好并且易于工程实现的低截获概率雷达信号.
关键词 mac序列 雷达信号 低截获概率 脉冲压缩
下载PDF
一个保护移动代理的代码检测-结果加密与鉴别算法(CD-ERA)
2
作者 许孝元 《计算机工程与应用》 CSCD 北大核心 2003年第19期180-182,共3页
该文提出的保护移动代理的CD-ERA算法不仅能检测移动代理的代码,还能鉴别移动代理的运行结果。而且,利用与运行移动代理的主机相关的密钥对运行结果加密,能有效地防止对移动代理运行结果的窥探和篡改攻击。
关键词 移动代理 篡改攻击 检测 消息鉴别(mac)
下载PDF
Authentication masking code against DoS of T-MAC protocol 被引量:2
3
作者 SON Young-ho HONG Jin-keun BAE Keun-sung 《Journal of Central South University》 SCIE EI CAS 2013年第7期1889-1895,共7页
Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient... Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7. 展开更多
关键词 time out-medium access control (T-mac security vulnerability AUTHENTICATION SYNCHRONIZATION authenticationmasking code
下载PDF
A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS
4
作者 Jia Min Chen Huimin Yuan Yuhua 《Journal of Electronics(China)》 2007年第1期64-68,共5页
This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided in... This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel,broadcast channel and several data chan-nels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol,the results show that the pro-posed mechanism improves the average throughput and limits the transmission delay efficiently. 展开更多
关键词 Ad hoc networks Medium Access Control mac protocol MULTICHANNEL Code Division Multiple Access (CDMA) Power control
下载PDF
组播分组数据源鉴别综述 被引量:2
5
作者 陈慧 熊光泽 刘璟 《计算机科学》 CSCD 北大核心 2004年第5期27-30,共4页
对组播分组数据源鉴别领域的现有研究成果进行了系统的分类和总结,指出了它们各自存在的优缺点;提出了一个公开问题——分组Hash有向图鉴别问题;指出了该领域的一些可能发展方向。
关键词 组播分组数据源 分组Hash有向图 组播安全 mac码 分组Hash链 数字签名算法
下载PDF
一种高频电子标签加密算法研究
6
作者 乔海晔 张文青 《电子设计工程》 2019年第8期99-103,共5页
传统电子标签加密算法,在加密过程中在不同应用设定中采用相同密钥,不能做到一钥一密,导致应用系统安全性低的问题。针对这个问题,提出一种高频电子标签加密算法,该算法以S50为例,提出一种对高频电子标签的加密算法,利用ISO/IEC14443/Ty... 传统电子标签加密算法,在加密过程中在不同应用设定中采用相同密钥,不能做到一钥一密,导致应用系统安全性低的问题。针对这个问题,提出一种高频电子标签加密算法,该算法以S50为例,提出一种对高频电子标签的加密算法,利用ISO/IEC14443/Type-A协议,将S50电子标签的UID码作为计算因子,用自定义长字符串作为发散因子,通过PSAM卡计算16扇区的密钥体系,从而实现S50电子标签的安全认证和电子标签的内部逻辑认证和外部MAC码认证。经认证所提算法能够根据扇区的不同应用设定不同的密钥,系统设计上做到一钥一密,比较传统算法安全性能提升50%。 展开更多
关键词 mac码 电子标签 发散因子 UID
下载PDF
基于部署前密钥分配的虚假数据过滤方案 被引量:1
7
作者 朱凌志 梁俊斌 +1 位作者 刘志雄 黄江华 《计算机工程与应用》 CSCD 2012年第26期96-100,共5页
针对传统虚假数据过滤方法无法过滤从非转发区域注入虚假数据的问题,提出了一种不依赖转发路径的过滤方案PFDF。在PFDF中,基于期望的密钥共享度灵活构建密钥池,在部署前进行密钥分发。理论分析及仿真实验表明,PFDF能有效防范非转发区域... 针对传统虚假数据过滤方法无法过滤从非转发区域注入虚假数据的问题,提出了一种不依赖转发路径的过滤方案PFDF。在PFDF中,基于期望的密钥共享度灵活构建密钥池,在部署前进行密钥分发。理论分析及仿真实验表明,PFDF能有效防范非转发区域的虚假数据注入攻击,并具备较低的能量开销。 展开更多
关键词 无线传感器网络 虚假数据过滤 消息验证(mac) 密钥池
下载PDF
高速公路联网收费软件开发中对非接触IC卡若干问题的解决
8
作者 林伟仁 胡筝 《中国交通信息产业》 2003年第2期33-34,共2页
相对传统的纸券、磁卡等信息介质,非接触IC卡以其存储容量大、数据稳定性高、简单的读写性、防伪性能强的优点在高速公路收费系统的运营中得到广泛的应用.
关键词 高速公路 联网收费软件 软件开发 非接触IC卡 发行工作 个人化 操作规范 数据量 坏卡处理 mac码 MifarePro卡 CPU双界面卡
下载PDF
A MULTIPLE-RECEPTION ACCESS PROTOCOL WITH INTERRUPTIONS WITH MIXED PRIORITIES IN CDMA NETWORKS
9
作者 Lu Xiaowen Zhu Jinkang (PCN and SS Laboratory, University of Science and Technology of China, Hefei 230027) 《Journal of Electronics(China)》 2003年第4期241-248,共8页
A novel access protocol called Multiple-Reception Access Protocol (WRAP) and its modification MRAP/WI are proposed. In this protocol, all colliding users with a common code can be identified by the base station due to... A novel access protocol called Multiple-Reception Access Protocol (WRAP) and its modification MRAP/WI are proposed. In this protocol, all colliding users with a common code can be identified by the base station due to the offset of arrival time. Thus they can retransmit access requests under the base station's control. Furthermore new arrivals with higher priority level can interrupt the lower retransmission in order to reduce its access delay although it, increases the lower priority's delay. Simulation results of MRAP and MRAP/WI are given in order to highlight the superior performance of the proposed approach. 展开更多
关键词 mac Multiple-reception access MRAP/WI Mixed priorities CDMA networks
下载PDF
Hierarchical Code Assignment Algorithm and StateBased CDMA Protocol for UWSN 被引量:2
10
作者 DU Xiujuan PENG Chunyan +1 位作者 LIU Xiuxiu LIU Yuchi 《China Communications》 SCIE CSCD 2015年第3期50-61,共12页
The characteristics of underwater acoustic channel such as long propagation delay and low bit rate cause the MAC(Medium Access Control) protocols designed for radio channels to be either inapplicable,or have low effic... The characteristics of underwater acoustic channel such as long propagation delay and low bit rate cause the MAC(Medium Access Control) protocols designed for radio channels to be either inapplicable,or have low efficiency for UWSN(Underwater Sensor Network).We propose a hierarchical and distributed code assignment algorithm based on divisive probability function which can avoid conflict between spread codes with high probability,and provide a statebased MAC protocol for UWSN.Without RTS/CTS(Request To Send/Clear To Send) handshaking,each node maintains a neighbor table including state field,and packages are forwarded according to the state of the receiver,so it can avoid the interference caused by transmitting to a sending node in a half-duplex system and improve channel utilization.The design of power control minimizes the nearfar effect inherent in CDMA.Simulation results reveal that state-based CDMA protocol shows outstanding performance in throughput,delivery ratio and resource-consumption. 展开更多
关键词 UWSN CDMA mac code assignment
下载PDF
Medium Access Control: A Physical Layer Network- Coded Approach 被引量:2
11
作者 ZHANG Yu XIONG Ke DU Liping 《China Communications》 SCIE CSCD 2014年第A02期1-11,共11页
This paper investigates the medium access control (MAC) stratifies for communication systems. Since the signals are naturally superposed in public medium, we introduce physical layer network coding into MAC system a... This paper investigates the medium access control (MAC) stratifies for communication systems. Since the signals are naturally superposed in public medium, we introduce physical layer network coding into MAC system and propose the physical layer network coded MAC (PNC-MAC) to utilize the collisions occurring in the MAC process. The implicit expressions of the throughput and average delay of the system operated with the new algorithm are derived in an iterative way. To show the performance of the algorithm, we compare the throughput and average delay induced by the new algorithm with current schemes via simulations. The results show that when operated with our proposed PNC-MAC, MAC system can achieve a larger throughput while the frames bear shorter average delay. Moreover, in many users case, the throughput increases slightly while the average delay ascends drastically. 展开更多
关键词 medium access control physical layernetwork coding tree method
下载PDF
Macwilliams Identities of Linear Codes over the Ring F_2+ uF_2+ vF_2
12
作者 LIU Xiusheng LIU Hualu 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2015年第3期691-701,共11页
The Lee weight enumerators and the complete weight enumerators for the linear codes over ring R = F2 + u F2 + v F2 are defined and Gray map from R^nto F2^3n is constructed. By proving the fact that the Gray images o... The Lee weight enumerators and the complete weight enumerators for the linear codes over ring R = F2 + u F2 + v F2 are defined and Gray map from R^nto F2^3n is constructed. By proving the fact that the Gray images of the self-dual codes over R are the self-dual codes over F2, and based on the Mac Williams identities for the Hamming weight enumerators of linear codes over F2, the Mac Williams identities for Lee weight enumerators of linear codes over R are given. Further, by introducing a special variable t, the Mac Williams identities for the complete weight enumerators of linear codes over R are obtained. Finally, an example which illustrates the correctness and function of the two Mac Williams identities is provided. 展开更多
关键词 Complete weight enumerators dual codes gray map Lee weight enumerators linear codes macwilliams identities.
原文传递
智能卡的安全性 被引量:2
13
作者 陈华 李大兴 《信息安全与通信保密》 2000年第3期26-29,共4页
智能卡就是带有微处理器(CPU)电路的IC卡。随着它的普及,有关智能卡的安全性问题就提到了日程上。文中主要讲述了涉及智能卡方面的一系列的安全问题及其本身的安全性设计。
关键词 智能卡 鉴别性 mac码
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部