ID |
原文 |
译文 |
47586 |
提出的认证协议可实现匿名性、可跟踪性、相互认证性、不可否认性和一些其他安全特性。 |
The scheme can providethe anonymity, traceability, mutual authentication, non-reputation and some other security features. |
47587 |
性能分析结果表明该方案更加适合于无线体域网。 |
The performance analysis results show the scheme is more suitable for WBAN. |
47588 |
提出了对应的互信息能量分析攻击, |
A novel method of mutual information power analysis attack was proposed. |
47589 |
该方法结合了能量分析的基本原理和信息论的基础, |
The method was built on the basis ofthe basic principle of power analysis and the basic theory of information. |
47590 |
利用能量泄露的中间值和能量迹计算两者的互信息大小,从而达到提取密钥的目的。 |
For the purpose of attacking the key, the mutual in-formation values was computed using two values between the mediate variable with the power traces. |
47591 |
利用该方法针对基于 SM3 的 HMAC 算法进行了实测攻击, |
An experiment was im-plemented on the algorithm of HMAC based on SM3 using this method. |
47592 |
实验表明,该方法可以成功恢复出 SM3 算法初始状态从而提取出正确的密钥,扩展了侧信道攻击的方法。 |
The experimental results show the proposed attackmethod is effective because the initial value of state variable can be successfully retrieved to compute the real true key. |
47593 |
提出了基于 BP 神经网络的 Wi-Fi 安全评价模型。 |
A Wi-Fi security evaluation model was proposed based on BP neural network. |
47594 |
首先,分析了大量 Wi-Fi 热点,选取与无线热点安全相关的信息源; |
Firstly a large number of Wi-Fihotspots was analyzed, safety information sources about wireless hotspots were selected. |
47595 |
其次,构造 BP 神经网络模型,并对权值进行调整,形成了有较高可信度的 Wi-Fi 安全性评估体系; |
Secondly, a model of BP neuralnetwork was constructed, the weights were adjusted, and the evaluation system for Wi-Fi safety was formed, which washigher credibility. |