ID | 原文 | 译文 |
4743 | 实验结果表明,该系统通过有机地结合集中式与分布式的处理方式,实现了及时的、自动化的网络控制与管理,具有良好的可扩展性。 | Experimental results indicate that by combining distributed and centralized processing seamlessly, the proposednetwork monitoring system can not only realize timely and automatic network control and management but also providesuperior scalability. |
4744 | 为了解决执行认证密钥交换协议时通信双方身份隐私保护问题,提出了一种基于 C 类承诺机制的抗量子攻击的双向认证密钥协商协议。 | In order to solve the problem of identity privacy preservation between two participants involved when imple-menting authenticated key agreement protocol, a bidirectional authenticated key agreement protocol against quantum at-tack based on C commitment scheme was proposed. |
4745 | 该协议通过 C 类承诺函数隐藏通信双方的真实身份信息,并基于 RLWE 困难问题,在保障身份匿名的前提下,通过 2 轮的消息交互不仅完成了双向身份认证,而且保证了传输消息的完整性,并协商出共享会话密钥。 | Through the design of C commitment function, the real identity in-formation of two participants involved was hidden. Based on RLWE difficult problem, under the premise to ensure iden-tity anonymity, this protocol not only completed two-way identity authentication, but also ensured the integrity of thetransmitted message, furthermore, the shared session key was negotiated. |
4746 | 经过分析,在协议执行效率上,完成匿名的双向认证与密钥协商只需 2 轮的消息传输,与 Ding 等的协议对比,公钥长度缩短近 50%; | After been analyzed, in terms of protocol's ex-ecution efficiency, only two rounds of message transmission were needed to complete anonymous two-way authenticationand key agreement in the proposed scheme. Compared with Ding's protocol, the length of public key was reduced bynearly 50%. |
4747 | 在安全性上,所提协议能够抵抗伪造、重放、密钥复制和中间人攻击。 | With regard to security, the protocol could resist forgery, replay, key-copy, and man-in-the-middle attacks. |
4748 | 所提协议在 eCK 模型下满足可证明安全性,同时所提协议基于格上的 RLWE 困难问题,可抵抗量子计算攻击。 | Itis proved that the proposed protocol satisfies the provable security under the eCK model. At the same time, the protocol isbased on the RLWE problem of lattices, and can resist quantum computing attacks. |
4749 | 基于目前绝大多数数字音频水印方案仅仅能够对抗简单的常规信号处理,尚无法有效抵抗破坏性较强的局部去同步攻击,提出了一种基于稳健特征点的平稳小波域数字音频水印算法。 | Aiming at the challenging work to design a robust digital audio watermarking algorithm against desynchroni-zation attacks, a new second generation digital audio watermarking in stationary wavelet transform (SWT) domain basedon robust local audio feature was proposed. |
4750 | 首先利用高斯滤波技术计算出平稳小波域低频子带的一阶平滑梯度响应并确定基准阈值,进而提取出分布均匀且性能稳定的音频特征点; | First, the first-order smooth gradient response of the low-pass sub-band coef-ficient was calculated using Gaussian filter. |
4751 | 然后结合短时能量自适应确定适合于水印嵌入的局部特征音频段; | Then, the short-term energy was utilized to adaptively determine local featureaudio segments for embedding. |
4752 | 最后利用扩展抖动调制方法将水印信息嵌入局部特征音频段中。 | Finally, the watermark information was embedded into local feature audio segments withspread transform dither modulation. |