ID | 原文 | 译文 |
3493 | 在最大译码错误概率约束下,对功率约束进行转化和计算,得到强用户发射功率范围,推导出基站向强用户的发射功率搜索集; | Under the constraint of maximum de-coding error probability, the power constraint was transformed and calculated to obtain the strict limit of transmitting powerfor strong users, and the transmit power search set from base station to strong user was derived. |
3494 | 然后利用一维搜索算法对功率进行分配,实现弱用户吞吐量最大化。 | Then, the one-dimensionalsearch algorithm was used to allocate power resources to maximize the throughput of weak users. |
3495 | 仿真结果证明,所提方案可有效提高系统中弱用户的安全吞吐量。 | Simulation results provethat the proposed algorithm can effectively improve the security throughput of weak users in the system. |
3496 | 物联网设备因资源受限,需要兼具安全性、灵活性的轻量级密码模块保障安全,白盒密码能够满足物联网设备的安全需求。 | The resources of IoT devices are limited. Therefore, security, flexibility and lightweight cryptographic modulesare required. The idea of white-box cryptography can meet the needs of IoT devices. |
3497 | 在常见的白盒密码实现方法中,往往密钥和查找表是绑定的,因此每次更换密钥都需要重新生成并更换查找表,这在实际应用中不够灵活。 | In common AES white-box imple-mentations, keys are bound to look up tables. So the look up tables must be changed when the keys are changed. It is notflexible enough in practical applications. |
3498 | 为了解决该问题,提出了一种基于 AES 的动态白盒实现方法,即 DWB-AES。 | To solve this problem, a dynamic white-box implementation method for AES,which was called DWB-AES, was proposed. |
3499 | 该方法通过改变轮与轮之间的边界,将加解密过程的所有操作均通过查找表来实现,并对表和密钥分别进行混淆,使整个加解密过程不会暴露密钥信息, | By changing the boundary between rounds, all operations of the encryption and decryption process were performed by looking up the tables, and the tables and the keys were respectively confused, so that the entire encryption and decryption process did not expose the key information. |
3500 | 且每次更换密钥时不需要更换查找表,所以 DWB-AES更加灵活和实用。 | The look up tables need not to be changed every time when the keys changed, which was more practical. |
3501 | 通过对 DWB-AES 的安全性分析表明,DWB-AES 具有较高的白盒多样性和白盒含混度,且能够有效地抵御 BGE 和 Mulder 等常见的白盒攻击方法。 | The security analysis of DWB-AES shows that the DWB-AES has higher white-box diversity and ambiguous, it can resist BGE attack and Mulder attack. |
3502 | 针对复杂多步攻击检测问题,研究面向云计算环境的攻击场景构建方法。 | Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction ori-ented to cloud computing environment was studied. |