• 理论分析表明这种密钥分配协议安全可靠

    Theory analysis shows that this kind of key code distribution's protocol is absolutely safe.

    youdao

  • 通常的量子密钥分配协议需要一个辅助经典信道来生成量子密钥

    In previous quantum key distribution protocols a auxiliary classical channel is needed.

    youdao

  • 理论计算证明了量子密钥分配协议这种攻击策略具有足够安全性

    It is shown that there is still an asymptotic perfect security of quantum key distribution under this attack strategy.

    youdao

  • 认证机制中引入公钥密码体制,提出一个基于公钥密码体制的3g认证密钥分配协议

    By introducing public key cryptosystem to the authentication mechanism, the author proposed a 3g authentications and key agreement protocol based on public key cryptosystem.

    youdao

  • 该文根据量子密钥分配原理提出实现对称密码体制密钥绝对保密量子密钥分配协议

    According to quantum key code distribution's principle, this paper has put forward absolutely safe protocol of quantum key code distribution for realizing the key of symmetrical cryptosystem.

    youdao

  • 本文充分掌握量子密钥研究现状的基础上,重点针对BB 84量子密钥分配协议展开了研究。

    In this paper, the author, under the full grasp of status of quantum cryptographic key research, does research concentrating on the BB84 quantum cryptographic key distribution protocol.

    youdao

  • 为了无线传感器网络提供节点之间快速认证,提出了一种基于ID无线传感器网络密钥分配协议

    In order to provide fast authentication between two nodes in wireless sensor networks, an ID-based key predistribution scheme for wireless sensor networks is proposed.

    youdao

  • 给出了经典计算机表示量子制备测量方法编制相应的程序,实现了多种量子密钥分配协议仿真

    Methods to express the preparation and measurement of quantum states on current computer and the basic algorithms for simulating the quantum key distribution protocols were given.

    youdao

  • 本文分析IMS认证密钥分配协议过程,找出了认证协议中的安全缺陷,给出了攻击者可能进行的攻击。

    In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.

    youdao

  • 目前已有的密钥管理协议主要包括组密钥分配协议密钥协商协议,总体来说,他们优缺点适用不同的情况。

    At present, group key management mainly divided into goup key distribution and group key agreement, both of them have their own character and can be used in different applications.

    youdao

  • 密钥分配协议数据安全通讯重要支持但是一些协议在发生密钥泄露,即使用新的安全密钥取代,仍有可能遭受再次攻击

    The key distribution protocols are important support for safe data communication, but some of them may be attacked again even adopt new safe key after key betrayed.

    youdao

  • 分析经典量子密钥分配协议——BB 84协议入手,发现了通信效率存在问题,并由此出发提出一个新的改进方案

    From analysis of the classic quantum crypt-key allotment agreement called BB84, problems existing in correspondence efficiency are discovered. A new improvement project is put forward.

    youdao

  • 详细分析了UMTS认证密钥分配协议过程以及协议安全性,找出协议中存在弱点和可能的攻击,提出了公钥加密协议的改进方法。

    This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.

    youdao

  • 如果可以应用替代分配密钥分配根据协议所提供服务有关费用当事人约定

    If agreed by the parties alternative allocation keys can be applied to allocate the costs relating to services rendered under this Agreement.

    youdao

  • 基于量子次一量子密钥分配,提出针对经典消息高效量子签名协议

    An efficient quantum signature protocol of classical messages which was based on quantum one-time pad and quantum key distribution was presented.

    youdao

  • 这个量子密钥传输协议通信节点控制中心之间通过多个GHZ构建安全的密码分配系统

    The quantum communication network marries a variety of GHZ states to well establish the secure key distribution system employed in conjunction with the nodes and control centers.

    youdao

  • 自由空间量子密钥分配中,光子采用具有泊松分布高度衰减激光脉冲,量子密码术协议采用BB 84B92协议

    Highly attenuated laser pulses with Poisson distribution are used as single-photon sources and the BB84 and B92 protocols are used for free-space quantum key distribution.

    youdao

  • 根据3gpp标准WLAN用户通过EAP -AKA协议来实现认证密钥分配过程

    According to the standard of 3gpp, WLAN users authenticate and distribute keys through EAP-AKA protocol.

    youdao

  • 密钥分配密码任务可以作为密钥交换协议中的一个重要子模块

    The three-party key distribution task (or, protocol) can be used as an important module for constructing key exchange protocols.

    youdao

  • 采用BAN逻辑协议进行形式化分析表明协议达到了认证密钥分配目标,具有较强的安全性

    Used BAN logic, the objective and the security of this protocol are proved by formal analysis process.

    youdao

  • 无线传感器网络应用二元多项式密钥分配协议通常容易遭受到敌方合谋攻击

    Wireless Sensor Network (WSN) was usually vulnerable to conspiracy attack from its adversaries when using bivariate polynomial key pre-distribution protocol.

    youdao

  • 当前的量子通信协议密钥分配系统大多基于点对点一对一的单行系统,现实中的通信网络是一对对多的复杂系统。

    The QKD protocols and the available QKD system are mostly based on the point-to-point, or one-to-one network, while the real communication needs one to many, many-to-many network.

    youdao

  • 当前的量子通信协议密钥分配系统大多基于点对点一对一的单行系统,现实中的通信网络是一对对多的复杂系统。

    The QKD protocols and the available QKD system are mostly based on the point-to-point, or one-to-one network, while the real communication needs one to many, many-to-many network.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定