深入分析了无线传感器网络密钥管理的特点,以及评价指标。
The paper also analyzes the challenges to the key management scheme in the WSN and describes the metrics of it .
目前的传感器网络密钥预分配方案的设计都是大量使用了组合设计以及图论的技巧。
Most known key pre-distribution scheme for distributed sensor networks, they use a lot of combinatorial design and graph theory techniques.
分析了现有密钥管理方案的安全漏洞,提出了一类基于椭圆曲线密码的网络密钥管理方案。
A key management scheme for network environment based on elliptic curves cryptosystem that can gain a wide application in computer and wireless communication network is presented.
为了在无线传感器网络中提供节点之间的快速认证,提出了一种基于ID的无线传感器网络密钥分配协议。
In order to provide fast authentication between two nodes in wireless sensor networks, an ID-based key predistribution scheme for wireless sensor networks is proposed.
通过这样一填充,即使我们重用密钥,偷听者在网络上两次看到的数也是不一样的。
If we reused the key, the eavesdropper would likely see a different value placed on the network due to the random padding.
不过,使用其他未变更密钥来连接的设备仍然可以连接到无线承载网络。
However, devices with the other unchanged key shall continue to be able to connect to the wireless Hosted Network.
KDC负责密钥分发和可能在网络上发生的所有身份验证过程。
KDC is responsible for key distribution and all the authentication processes which may take place in the network.
当使用双重安全密钥创建了所有经过的交互点和数据路径时,才能达到安全网络体系结构。
Secure network architecture is achieved when all interaction points and data paths traveled are created using double secure keys.
通过网络和由传输提供的安全性、消息中已批准的声明,以及用收件人已知的密钥对请求进行加密,请求者可以对收件人进行身份验证。
Requesters can authenticate recipients using network and transport-provided security, claims proven in messages, and encryption of the request using a key known to the recipient.
网络部分包含获取票证和其他服务所需的信息(比如,它包含主体秘密密钥)。
Network part contains the information required to acquire tickets and other services (e.g. it includes the principals secret key).
Geambasu 博士与她的同事们意识到:由于电脑的登录与退出数保持在一个相当稳定的比率,因此他们能够利用这些网络作为临时存储密钥的场所。
colleagues realised that because computers logged on and off P2Ps at a fairly steady rate, they could use these networks as places to store encryption keys temporarily.
从客户端将消息发送到网络之前,WS-Security使用了非对称密钥对消息进行数字签名和加密。
Prior to the message being sent onto the wire from the client, WS-Security used asymmetric keys to digitally sign and encrypt the message.
一旦计算机断开对等网络,网络形成的节点随即不复存在,储存在节点上的密钥数据也随之消失。
When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.
在任何计算机中,无线承载网络都有且只有一个主密钥,一个第二密钥。
There is exactly one primary key and at most one secondary key for the wireless Hosted Hetwork on any computer.
他们说,这会使通信网络中高速、高保真、大容量的信息传输,如量子密钥技术,成为可能。
They say it will make possible high-speed, high-fidelity transmission of large volumes of information, such as quantum encryption keys, via communications networks.
为了便于使用,无线承载网络还支持“第二密钥”,也称作“用户安全密钥”,使用起来更加友好,但是安全性稍差。
To allow for ease of use, wireless Hosted Network also supports the concept of a secondary or user security key that is more user-friendly, but could be less secure.
Geambasu博士和她的同事们发现,由于计算机用户们登入和登出P 2 P网络的频率相当稳定,因此他们可以利用该网络来临时存储密钥。
Dr Geambasu and her colleagues realised that because computers logged on and off P2Ps at a fairly steady rate, they could use these networks as places to store encryption keys temporarily.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
最后介绍在网络规模极大的情况下,可以采用的群密钥管理方法,它改进了方案可支持的网络规模。
Finally, this paper introduces methods of group key management for extremely large-scale network, which can enlarge the maximum supportable network size.
密钥管理通过IP网络传输,结合PKI与智能卡技术,可以保证密钥传输的安全性和正确性。
Key management can make the key transporting on IP network safe and accurate greatly combining with PKI and smart card method.
同时,所有网络服务商应该建立一个电子邮件地址身份系统(有两个好的标准,域名密钥和存储保护特征)。
At the same time, all ISPs should implement an E-mail ID system (there are two good standards, called Domain Keys and SPF).
电子会议是网络的一种重要应用形式,而在电子会议中,会议密钥的管理与分发是一个极为重要的问题。
Electronic conference is an important application of network, and the management and distribution of conference key is a quite important issue.
本模型不仅适用于实时的、大数据传输的网络系统,而且实现了密钥管理、加密管理、数字签名以及身份认证等功能。
The model not only realizes key management, encrypted communication, digital signature and identity authentication, but also is fit for network system with real time and large data transfer.
然而由于传感器网络自身资源的限制,使得传感器网络的组密钥管理面临巨大的挑战。
But group key management in WSN faces a great challenge because of the resources are constrained.
设计和实现了XKDS密钥分配方案,讨论了网络会议中的应用问题。
XKDS key distribute schemes are designed. The problem about its application under network meeting condition is discussed.
针对空间网络的特点及空间网络对密钥交换的特殊需求,提出一种适用于空间网络的密钥交换协议。
Aiming at the characteristics of space networks and their special requirements for key exchange, this paper proposes a key exchange protocol for space networks.
为构建VPN网络等应用场合,指明了密钥交换协议的选取依据。
All this paves the way for the selecting the standard of key exchange protocol when we construct network such as VPN.
文章提出了一种在P 2 P网络中安全分发密钥和进行对等点身份认证的方法。
A ploy to ensure the security distribution of the key and the identity authentication of the peers in P2P network is provided in this paper.
文章提出了一种在P 2 P网络中安全分发密钥和进行对等点身份认证的方法。
A ploy to ensure the security distribution of the key and the identity authentication of the peers in P2P network is provided in this paper.
应用推荐