ID |
原文 |
译文 |
46246 |
该模型利用不等簇半径和数据流量监测对网络建模,保证各簇头能量消耗均衡。 |
With the adoption of unequal cluster radius and data traffic monitoring explicitly, the inhibition mechanism was modeled as multivariate linear equations. |
46247 |
通过节点的环形截面投影求解数据发送的欧几里得距离,从而配置动态簇头的初始能量。 |
Further-more, toroidal projection was adopted to calculate the Euclidean distance, based on which the initial energy of mobile cluster head was configured correspondingly. |
46248 |
在此基础上,当单个圆环和多个圆环区域遭受攻击时,给出了基于簇头最小生命周期和流量阈值的能量空洞攻击检测抑制算法。 |
On this basis, an algorithm based on the minimum cluster lifetime and throughput threshold was provided to achieve the detection and suppression of energy sink-hole attack. |
46249 |
实验结果表明,该算法在 WSN 能量空洞攻击抑制方面有明显优势。 |
The experimental results show that the developed algorithm can suppress energy sink-hole attack evidently and efficiently and is suitable to the resource constrained WSN. |
46250 |
Qu-Tan-Tan-Li 函数、Zha-Hu-Sun 函数和 Tang-Carlet-Tang 函数是近些年提出的差分均匀度为 4、各项安全性指标均优良的向量值密码函数。 |
In recent years, Qu-Tan-Tan-Li function, Zha-Hu-Sun function and Tang-Carlet-Tang function have been pro-posed with differential uniformity 4 and many good cryptographic properties. |
46251 |
研究与这 3 种密码函数仿射等价函数的计数问题。 |
The counting problem of affine equivalent to the three families cryptographic functions was investigated. |
46252 |
利用有限域的一些性质,分别计算出与 Zha-Hu-Sun 函数仿射等价函数数量的上下界,与 Qu-Tan-Tan-Li 函数和 Tang-Carlet-Tang 函数仿射等价函数数量的上界。 |
By using some properties of finite fields, the upper and lower bound of the number of affine equivalent to the Zha-Hu-Sun function, and the upper bound of the number of affine equivalent to the Qu-Tan-Tan-Li function and Tang-Carlet-Tang function were computed, respectively. |
46253 |
此外,对于 Zha-Hu-Sun 函数仿射等价函数数量的精确值提出了猜测。 |
Moreover, a conjecture was given about the exact number of affine equivalent to the Zha-Hu-Sun function. |
46254 |
研究结果表明,有限域 GF(2 8 )上至少有285312 (2 1)ii 个与 Zha-Hu-Sun 函数仿射等价的密码函数可直接用于分组密码的 S 盒。 |
Results show that there are atleast285312 (2 1)ii=é ù-ê úë ûÕcryptographic functions of affine equivalent to the Zha-Hu-Sun function over finite field GF(2 8 ),which can be chosen as S-boxes of block ciphers. |
46255 |
无证书广义指定验证者聚合签名机制不仅能够解决证书管理和密钥托管问题,而且能够实现批验证和保护签名者的隐私。在资源受限的无线移动网络中有广泛应用。 |
Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks, because they could not only solve the problems of the certificate management and private key escrow, but also realize batch validation and the signer’s privacy protection. |