• A new quantum key distribution protocol that differs from the BB84 protocol is analysised.

    讨论了不同BB 84协议量子密匙传输协议的安全性。

    youdao

  • In order to decrease the storage cost of group key distribution protocol, a secure group key distribute protocol based on the status key tree is proposed.

    为了减少群组密钥分发协议存储代价提出了一种基于状态密钥的群组密钥分发协议。

    youdao

  • This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.

    详细分析了UMTS认证密钥分配协议过程以及协议的安全性,找出协议中存在弱点可能攻击,提出了公钥加密协议的改进方法。

    youdao

  • In this paper, the author, under the full grasp of status of quantum cryptographic key research, does research concentrating on the BB84 quantum cryptographic key distribution protocol.

    本文充分掌握量子密钥研究现状的基础上,重点针对BB 84量子密钥分配协议展开了研究。

    youdao

  • We discussed the interaction between a photon and the atmosphere, and simulated the quantum key distribution protocol between atmospheric channels using the quantum computation language.

    讨论光子大气相互作用利用量子计算语言对大气信道中的量子密钥分配进行了仿真

    youdao

  • Kerberos is one such network authentication protocol that provides centralized authentication by storing the database of relevant data in a central repository known as a Key Distribution Center (KDC).

    Kerberos正是这样的一种身份验证协议通过称为密钥分发中心(KDC)的中央存储库中存储相关信息数据库,从而提供集中式的身份验证。

    youdao

  • An efficient quantum signature protocol of classical messages which was based on quantum one-time pad and quantum key distribution was presented.

    基于量子次一量子密钥分配,提出针对经典消息高效量子签名协议

    youdao

  • According to quantum key code distribution's principle, this paper has put forward absolutely safe protocol of quantum key code distribution for realizing the key of symmetrical cryptosystem.

    该文根据量子密钥分配原理提出实现对称密码体制密钥绝对保密量子密钥分配协议

    youdao

  • The three-party key distribution task (or, protocol) can be used as an important module for constructing key exchange protocols.

    密钥分配密码任务可以作为密钥交换协议中的一个重要子模块

    youdao

  • The key problems of security interaction model design lie in the real-time distribution of policy and designing security interaction protocol.

    策略实时分发安全联动交换协议设计是安全联动模型设计关键问题

    youdao

  • The quantum key distribution of BB84 protocol is simulated on the computer at the end of the paper.

    最后BB 84协议量子密钥生成与分发进行了程序模拟。

    youdao

  • Firstly, based on the analysis of some implementations of BB84 protocol, we developed a scheme of quantum key distribution by using polarization encoding and only one single photon detector.

    首先研究BB 84协议各种具体实现方法基础上,提出种基于偏振编码量子密钥分发方案,该方案使用台单光子探测器

    youdao

  • Wireless Sensor Network (WSN) was usually vulnerable to conspiracy attack from its adversaries when using bivariate polynomial key pre-distribution protocol.

    无线传感器网络应用二元多项式密钥预分配协议通常容易遭受到敌方合谋攻击

    youdao

  • Through creating the cluster key, the protocol reduces the key storage cost and resolves the problem of high communication cost for key distribution and renewing.

    通过建立密钥对,降低了密钥存储开销解决了密钥对建立更新过程通信开销问题

    youdao

  • Through creating the cluster key, the protocol reduces the key storage cost and resolves the problem of high communication cost for key distribution and renewing.

    通过建立密钥对,降低了密钥存储开销解决了密钥对建立更新过程通信开销问题

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定