ID 原文 译文
47586 提出的认证协议可实现匿名性、可跟踪性、相互认证性、不可否认性和一些其他安全特性。 The scheme can providethe anonymity, traceability, mutual authentication, non-reputation and some other security features.
47587 性能分析结果表明该方案更加适合于无线体域网。 The performance analysis results show the scheme is more suitable for WBAN.
47588 提出了对应的互信息能量分析攻击, A novel method of mutual information power analysis attack was proposed.
47589 该方法结合了能量分析的基本原理和信息论的基础, The method was built on the basis ofthe basic principle of power analysis and the basic theory of information.
47590 利用能量泄露的中间值和能量迹计算两者的互信息大小,从而达到提取密钥的目的。 For the purpose of attacking the key, the mutual in-formation values was computed using two values between the mediate variable with the power traces.
47591 利用该方法针对基于 SM3 的 HMAC 算法进行了实测攻击, An experiment was im-plemented on the algorithm of HMAC based on SM3 using this method.
47592 实验表明,该方法可以成功恢复出 SM3 算法初始状态从而提取出正确的密钥,扩展了侧信道攻击的方法。 The experimental results show the proposed attackmethod is effective because the initial value of state variable can be successfully retrieved to compute the real true key.
47593 提出了基于 BP 神经网络的 Wi-Fi 安全评价模型。 A Wi-Fi security evaluation model was proposed based on BP neural network.
47594 首先,分析了大量 Wi-Fi 热点,选取与无线热点安全相关的信息源; Firstly a large number of Wi-Fihotspots was analyzed, safety information sources about wireless hotspots were selected.
47595 其次,构造 BP 神经网络模型,并对权值进行调整,形成了有较高可信度的 Wi-Fi 安全性评估体系; Secondly, a model of BP neuralnetwork was constructed, the weights were adjusted, and the evaluation system for Wi-Fi safety was formed, which washigher credibility.