24小时热门版块排行榜    

查看: 436  |  回复: 1
本帖产生 1 个 翻译EPI ,点击这里进行查看
当前只显示满足指定条件的回帖,点击这里查看本话题的所有回帖

befair

铁杆木虫 (正式写手)

【答案】应助回帖

★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★
liushaojiang: 金币+50, 翻译EPI+1, ★★★★★最佳答案, 非常感谢! 2013-10-14 15:06:04
When obtaining node data through user identification in wireless sensor networks, it happens that passwords are cracked and there are also other security problems e.g. being prone to network attacks. Focused on this and based on the improved identity verification mechanism, ** protocol is proposed after introducing a verification mechanism between A and B as well as between B and C, and a mechanism for user password change. This protocol has security features that prevent gateway node sideway attacks, masked attacks and other network attacks and its provided capability of password change protection can prevent security problems when passwords are leaked out. Experimental results show Protocol A offers much higher security than other improved B protocols.
供参考
Befairorbeaware
2楼2013-10-14 11:36:13
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 liushaojiang 的主题更新
信息提示
请填处理意见