深入分析了无线传感器网络密钥管理的特点,以及评价指标。
The paper also analyzes the challenges to the key management scheme in the WSN and describes the metrics of it .
目前的传感器网络密钥预分配方案的设计都是大量使用了组合设计以及图论的技巧。
Most known key pre-distribution scheme for distributed sensor networks, they use a lot of combinatorial design and graph theory techniques.
分析了现有密钥管理方案的安全漏洞,提出了一类基于椭圆曲线密码的网络密钥管理方案。
A key management scheme for network environment based on elliptic curves cryptosystem that can gain a wide application in computer and wireless communication network is presented.
为了在无线传感器网络中提供节点之间的快速认证,提出了一种基于ID的无线传感器网络密钥分配协议。
In order to provide fast authentication between two nodes in wireless sensor networks, an ID-based key predistribution scheme for wireless sensor networks is proposed.
通过这样一填充,即使我们重用密钥,偷听者在网络上两次看到的数也是不一样的。
If we reused the key, the eavesdropper would likely see a different value placed on the network due to the random padding.
不过,使用其他未变更密钥来连接的设备仍然可以连接到无线承载网络。
However, devices with the other unchanged key shall continue to be able to connect to the wireless Hosted Network.
KDC负责密钥分发和可能在网络上发生的所有身份验证过程。
KDC is responsible for key distribution and all the authentication processes which may take place in the network.
当使用双重安全密钥创建了所有经过的交互点和数据路径时,才能达到安全网络体系结构。
Secure network architecture is achieved when all interaction points and data paths traveled are created using double secure keys.
通过网络和由传输提供的安全性、消息中已批准的声明,以及用收件人已知的密钥对请求进行加密,请求者可以对收件人进行身份验证。
Requesters can authenticate recipients using network and transport-provided security, claims proven in messages, and encryption of the request using a key known to the recipient.
没有密钥,则没有网络。
网络部分包含获取票证和其他服务所需的信息(比如,它包含主体秘密密钥)。
Network part contains the information required to acquire tickets and other services (e.g. it includes the principals secret key).
Geambasu 博士与她的同事们意识到:由于电脑的登录与退出数保持在一个相当稳定的比率,因此他们能够利用这些网络作为临时存储密钥的场所。
colleagues realised that because computers logged on and off P2Ps at a fairly steady rate, they could use these networks as places to store encryption keys temporarily.
从客户端将消息发送到网络之前,WS-Security使用了非对称密钥对消息进行数字签名和加密。
Prior to the message being sent onto the wire from the client, WS-Security used asymmetric keys to digitally sign and encrypt the message.
一旦计算机断开对等网络,网络形成的节点随即不复存在,储存在节点上的密钥数据也随之消失。
When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.
在任何计算机中,无线承载网络都有且只有一个主密钥,一个第二密钥。
There is exactly one primary key and at most one secondary key for the wireless Hosted Hetwork on any computer.
他们说,这会使通信网络中高速、高保真、大容量的信息传输,如量子密钥技术,成为可能。
They say it will make possible high-speed, high-fidelity transmission of large volumes of information, such as quantum encryption keys, via communications networks.
为了便于使用,无线承载网络还支持“第二密钥”,也称作“用户安全密钥”,使用起来更加友好,但是安全性稍差。
To allow for ease of use, wireless Hosted Network also supports the concept of a secondary or user security key that is more user-friendly, but could be less secure.
Geambasu博士和她的同事们发现,由于计算机用户们登入和登出P 2 P网络的频率相当稳定,因此他们可以利用该网络来临时存储密钥。
Dr Geambasu and her colleagues realised that because computers logged on and off P2Ps at a fairly steady rate, they could use these networks as places to store encryption keys temporarily.
对数据加密设备和数据网络中密钥的管理和分配问题进行了探讨。
Finally, the management and assignment of secret key in data encryption devices and data networks.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
密钥管理是计算机网络信息安全中一项专门的安全机制。
The secret key management is a special security mechanism in the information security of computer network.
最后介绍在网络规模极大的情况下,可以采用的群密钥管理方法,它改进了方案可支持的网络规模。
Finally, this paper introduces methods of group key management for extremely large-scale network, which can enlarge the maximum supportable network size.
密钥管理通过IP网络传输,结合PKI与智能卡技术,可以保证密钥传输的安全性和正确性。
Key management can make the key transporting on IP network safe and accurate greatly combining with PKI and smart card method.
同时,所有网络服务商应该建立一个电子邮件地址身份系统(有两个好的标准,域名密钥和存储保护特征)。
At the same time, all ISPs should implement an E-mail ID system (there are two good standards, called Domain Keys and SPF).
在网络信息安全领域,服务器与客户机之间的密钥协商显得非常必要。
In the area of network information security, key agreement is essential between servers and clients.
密钥建立是通信网络安全中的关键问题。
Key establishment is the central problem in communication and network security.
应用密钥的证书管理方式,可以大大改善网络的安全性。
Applying this key management, great improvement of network's security can be made.
本模型不仅适用于实时的、大数据传输的网络系统,而且实现了密钥管理、加密管理、数字签名以及身份认证等功能。
The model not only realizes key management, encrypted communication, digital signature and identity authentication, but also is fit for network system with real time and large data transfer.
本模型不仅适用于实时的、大数据传输的网络系统,而且实现了密钥管理、加密管理、数字签名以及身份认证等功能。
The model not only realizes key management, encrypted communication, digital signature and identity authentication, but also is fit for network system with real time and large data transfer.
应用推荐