ID | 原文 | 译文 |
46276 | 并在随机预言模型下证实了该方案能够抵抗 Type I 与 Type II 攻击; | Furthermore, under the random oracle model, the scheme can resist Type I and Type II attacks. |
46277 | 该方案采用无证书的认证方式,有效减轻了系统存储负载, | Because there is no need to use certificates during authentication, the system storage load is effectively reduced. |
46278 | 同时方案在非线性对运算基础上,实现消息的批量认证,有效提高了认证效率。 | At the same time, the scheme realizes the batch message authentication on the basis of pairing-free operation, so the authentication efficiency is improved. |
46279 | 因此,该方案在资源受限的物联网或嵌入式环境中,有着重要的理论意义与应用价值。 | Therefore, the scheme has important theoretical significance and application value in the resource-limited internet of things or embedded environment. |
46280 | 提出一种 ad hoc 移动云计算方案,即移动设备通过分享邻近设备的闲置资源,将任务卸载至邻近设备协助处理。 | An ad hoc mobile cloud had been proposed to offload workload to neighboring mobile devices for resource sharing. |
46281 | 主要关注是否进行卸载,如何选取合适的卸载目标设备,以及如何分配任务的问题。 | The issues that whether to offload or not was addressed, how to select the suitable mobile device to offload, and how to assign workload. |
46282 | 以上问题使用博弈方法进行定义,并使用分布式算法逼近最优结果。 | Game theoretic approach was used to formulate this problem, and then, a distributed scheme was designed to achieve the optimal solution. |
46283 | 仿真结果证明了该方法的正确性与有效性。 | The experimental results validate the rightness and effectiveness of proposed scheme. |
46284 | I-PRESENT 是一种适用于 RFID、无线传感节点等资源受限环境的代换——置换型分组密码。 | I-PRESENT was a lightweight SPN block cipher for resource-constraint environments such as RFID tags and sensor networks. |
46285 | 利用中间筛选技术来构造 I-PRESENT 的 biclique 结构, | The biclique structures of I-PRESENT with sieve-in-the-middle technique was an constracted. |