ID 原文 译文
46876 通过路侧单元节点(RSU)与车辆共同生成签名, The signature was generated bythe roadside unit node (RSU) and the vehicle together.
46877 有效减轻了 VANET 认证中心的负担进而提高认证效率, Thus, the burden of VANET certification center was reduced andthe authentication efficiency was proved.
46878 并且增加了攻击者提取密钥的难度, Meanwhile, the difficulty of the attacker to extract the key was increased.
46879 并在随机预言模型中给出其安全性证明。 Fur-thermore, security proofs were given to the scheme in the random oracle model.
46880 分析表明,该方案能够满足多种安全需求,计算开销明显降低,认证效率得到有效提高。 Analysis shows that the proposed schemecan meet the needs of many kinds of security requirements, the computational overhead is significantly reduced, and theauthentication efficiency is improved effectively too.
46881 因此,该方案在计算性能受限的物联网(IoT, Internet of things)环境中,有着重要的理论意义与应用价值。 Therefore, the scheme has important theoretical significance andapplication value under computational capability constrained Internet of things (IoT) environment.
46882 深藏在网络协议中的隐形攻击行为日益成为网络安全面临的新挑战。 Deep stealth attack behavior in the network protocol becomes a new challenge to network security.
46883 针对现有协议逆向分析方法在协议行为分析特别是隐形攻击行为挖掘方面的不足,提出了一种新颖的指令聚类感知挖掘方法。 In view ofthe shortcomings of the existing protocol reverse methods in the analysis of protocol behavior, especially the stealth at-tack behavior mining, a novel instruction clustering perception mining algorithm was proposed.
46884 通过抽取协议的行为指令序列,利用指令聚类算法对所有的行为指令序列进行聚类分析,根据行为距离的计算结果,从大量未知协议程序中快速准确地挖掘出隐形攻击行为指令序列。 By extracting the proto-col's behavior instruction sequences,and clustering analysis of all the behavior instruction sequences using the instructionclustering algorithm, the stealth attack behavior instruction sequences can be mined quickly and accurately from a largenumber of unknown protocol programs according to the calculation results of the behavior distance.
46885 将动态污点分析和指令聚类分析相结合,在自主研发的虚拟分析平台 HiddenDisc 上分析了 1 297 个协议样本,成功挖掘出 193 个隐形攻击行为,自动分析和手动分析的结果完全一致。 Combining dynamictaint analysis with instruction clustering analysis,1 297 protocol samples were analyzed in the virtual analysis platformhidden disc which was developed independently,and 193 stealth attack behaviors were successfully mined,the results ofautomatic analysis and manual analysis were completely consistent.