The algorithm has the fairness of the session key agreement.
该算法具有会话密钥协商的公平性。
This paper proposes a new authenticated key agreement protocol.
提出一个新的高效认证密钥协商协议。
Authenticated key agreement is an important original language of cryptology.
认证密钥协商协议是一种重要的密码学原语。
Identification mechanisms can include certificates, key names, and key agreement algorithms.
识别资料机制可以包括证书、金钥名称和金钥协定算法。
The group key agreement has been discussed as a special case of secure multi-party computation.
研究了安全多方计算的一个特例——组密钥协商。
Property retrieves the date and time of the start of the key agreement protocol by the originator.
属性检索发信方开始密钥协议的日期和时间。
In the area of network information security, key agreement is essential between servers and clients.
在网络信息安全领域,服务器与客户机之间的密钥协商显得非常必要。
Its core services provide authenticated group key agreement in relatively small dynamic peer groups.
它的核心服务是为一个相对较小的多播组提供验证的组密钥交换。
Group Key Agreement (GKA) is one of the important methods to ensure the subsequent secure communication.
群组密钥协商(GKA)是保证随后安全通信的重要手段之一。
An authenticated group key agreement scheme with admission control for dynamic peer groups was presented.
针对动态对等群组设计了一个具有许可控制功能并且可认证的密钥协商方案。
Because of the importance of key agreement, key agreement research became cryptography a research hotspot.
由于密钥协商的重要性,密钥协商的研究成为了密码学中一个研究的热点。
Object that contains the value of the date and time of the start of the key agreement protocol by the originator.
对象,该对象包含发信方开始密钥协议的日期和时间值。
The problem of identity authentication and key agreement is a very important one about security in wireless communications.
身份认证和密钥协商是无线通信中一个非常重要的安全问题。
Combined with complete binary tree architecture, a new identity-based group key agreement protocol is proposed in this paper.
文中结合完全二叉树结构,提出了一种新的基于身份的群密钥协商协议。
The shortcomings to 3G Authentication and Key Agreement(AKA) protocol were described through analyzing its procedure and security.
分析了3G认证与密钥协商协议(AKA)的过程和特点,指出了存在的缺陷,提出了一种新的AKA改进方案。
Group key agreement scheme is more adaptable than group key distribution in DPG in which its membership can be frequently changed.
在群成员随时变动的动态对等群组中,群密钥协商比群密钥分配更适用。
This protocol overcomes the drawbacks of several previously proposed chaotic key agreement protocols, so it is effective and secure.
该协议克服了之前提出的基于混沌的密钥协商协议的一些缺陷,具有较高的安全性。
This paper presented a hierarchical key agreement scheme H-IBD based on the analysis of traditional scheme BD and improved scheme IBD.
在分析传统的BD方案和改进方案IBD的基础上提出一种层次化的密钥协商方案H-IBD。
As the foundation of Grid communication security, research on the authentication and key agreement mechanism is one of the hot topics.
作为网格通信安全的基础,安全认证密钥协商机制是研究的热点问题之一。
Attack, a method of resisting server compromise attack is given and a new password-based authenticated key agreement protocol is proposed.
针对服务器泄漏攻击,给出了抵抗这种攻击的方法,提出了一个新的基于口令的认证密钥协商协议。
Based on tree and threshold idea Wang et al. proposed an efficient group key agreement protocol (TTS) and claimed that their protocol is secure.
基于树结构与门限的思想,王志伟等人提出了一个高效的组密钥协商协议(TTS协议),并认为他们的协议是安全的。
Currently, Mobile AD Hoc Networks is getting more and more attention at home and abroad, especially the key agreement and authentication schemes.
目前移动自组网的安全问题越来越受到国内外的重视,特别是密钥协商和消息认证技术。
There are three kind of key agreement protocols: two-party key agreement protocols, three-party key agreement protocols, group key agreement protocols.
根据参与者数目的不同,密钥协商协议分为两方密钥协商协议、三方密钥协商协议和组密钥协商协议。
The scheme is based hierarchical key tree and multi-party key agreement. It possesses the desired properties, such as key independence and key statelessness.
提出的方案基于层次密钥树结构和多方密钥协商并具有密钥独立性和无状态型等特征。
In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.
本文分析了IMS认证与密钥分配协议的过程,找出了认证协议中的安全缺陷,并给出了攻击者可能进行的攻击。
Proposes an encryption scheme based on ECC and AES, expatiates the process of design, including key agreement, generation of conversation key and choice of encrypt mode.
提出一种基于ECC和AES相结合的加密系统,具体阐述了该系统的设计过程,包括密钥协定、会话密钥的生成及加密模式的选择。
This paper proposed a new certificateless two-party key agreement protocol using pairing operation in elliptic curves, it only required each party to compute one pairing.
应用椭圆曲线的配对运算,提出了一个两方的无证书密钥协商协议,其中每一方只需计算一个配对,并证明了它在ECK模型下的安全性。
A new group key agreement protocol was proposed in this paper. In this protocol, the participants could verify the honesty of other participants by a series of algorithms.
提出了一种新的群组密钥协商协议,在协议中,参与者可以通过一系列算法对其他参与者的真伪进行验证。
In connection with the requirements on personal communications, an implementation of an authentication and key agreement protocol based on public key cryptosystem is given.
本文针对个人通信系统的需求,给出一种基于公钥体系的认证和密钥约定协议的实现方案。
By introducing public key cryptosystem to the authentication mechanism, the author proposed a 3g authentications and key agreement protocol based on public key cryptosystem.
在认证机制中引入公钥密码体制,提出了一个基于公钥密码体制的3g认证与密钥分配协议。
应用推荐