| 查看: 684 | 回复: 3 | ||||
| 本帖产生 1 个 翻译EPI ,点击这里进行查看 | ||||
liushaojiang银虫 (小有名气)
|
[求助]
求助翻译一段摘要,翻译完送100金币!
|
|||
急求好人翻译一段摘要,自己英文水平不过关啊 ,不要用软件翻译,翻译完即送100金币,![]() 要翻译的摘要:为了强化合法用户通过身份验证获取传感器网络节点数据时的安全性能,基于已有的A协议和B协议的研究基础,提出一种混合C协议的无线传感器网络身份验证协议(D)。该协议具有A协议通过单向散列函数和异或运算来实现加密/解密的性能,并具有B协议采用唯一的智能卡进行身份验证的特点,相比这两个协议,D协议增加了密码变更阶段,并且在协议的验证阶段增加了登录节点与传感器节点之间的互相验证操作,加强了身份验证的安全性。通过进行协议的安全特性对比和计算成本分析,表明D协议相比A协议和B协议,可以抵御伪装网关重放攻击,伪装登陆节点攻击以及蛮力攻击,并具有更好的安全性能。 |
» 猜你喜欢
表哥与省会女结婚,父母去帮带孩子被省会女气回家生重病了
已经有9人回复
AI 太可怕了,写基金时,提出想法,直接生成的文字比自己想得深远,还有科学性
已经有10人回复
同年申请2项不同项目,第1个项目里不写第2个项目的信息,可以吗
已经有10人回复
天津大学招2026.09的博士生,欢迎大家推荐交流(博导是本人)
已经有10人回复
依托企业入选了国家启明计划青年人才。有无高校可以引进的。
已经有11人回复
依托企业入选了国家启明计划青年人才。有无高校可以引进的。
已经有11人回复
feixiaolin
荣誉版主 (文坛精英)
-

专家经验: +518 - 翻译EPI: 28
- 应助: 942 (博后)
- 贵宾: 1.275
- 金币: 3430
- 散金: 58785
- 红花: 532
- 沙发: 11
- 帖子: 24215
- 在线: 2601.8小时
- 虫号: 2139575
- 注册: 2012-11-21
- 专业: 光学信息获取与处理
- 管辖: 数学
【答案】应助回帖
★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ...
liushaojiang: 金币+100, 翻译EPI+1, ★★★★★最佳答案, 非常感谢 2014-01-18 19:30:24
liushaojiang: 金币+100, 翻译EPI+1, ★★★★★最佳答案, 非常感谢 2014-01-18 19:30:24
| Our protocol agreement has the performance of one-way hash function and XOR to implement encryption /decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. By comparing characteristics of security features and the calculating cost, it showed that D agreements has better safety performance than either A or B in camouflage gateway replay attack, camouflage landing node attack and brute force attack. |
2楼2014-01-18 15:25:02
feixiaolin
荣誉版主 (文坛精英)
-

专家经验: +518 - 翻译EPI: 28
- 应助: 942 (博后)
- 贵宾: 1.275
- 金币: 3430
- 散金: 58785
- 红花: 532
- 沙发: 11
- 帖子: 24215
- 在线: 2601.8小时
- 虫号: 2139575
- 注册: 2012-11-21
- 专业: 光学信息获取与处理
- 管辖: 数学
【答案】应助回帖
|
// 刚才落下了第一部分,现补全。 For strengthening the safety performance of legitimate users access network node data through authentication, , it was proposed that a wireless sensor network authentication protocol (D) which combining protocol (C) based on analysis of existing protocols A and B. Our protocol agreement has the performance of one-way hash function and XOR to implement encryption / decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. Our protocol agreement has the performance of one-way hash function and XOR to implement encryption /decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. By comparing characteristics of security features and the calculating cost, it showed that D agreements has better safety performance than either A or B in camouflage gateway replay attack, camouflage landing node attack and brute force attack. |
3楼2014-01-18 15:33:34
feixiaolin
荣誉版主 (文坛精英)
-

专家经验: +518 - 翻译EPI: 28
- 应助: 942 (博后)
- 贵宾: 1.275
- 金币: 3430
- 散金: 58785
- 红花: 532
- 沙发: 11
- 帖子: 24215
- 在线: 2601.8小时
- 虫号: 2139575
- 注册: 2012-11-21
- 专业: 光学信息获取与处理
- 管辖: 数学
| For strengthening the safety performance of legitimate users access network node data through authentication, , it was proposed that a wireless sensor network authentication protocol (D) which combining protocol (C) based on analysis of existing protocols A and B. Our protocol agreement has the performance of one-way hash function and XOR to implement encryption /decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. By comparing characteristics of security features and the calculating cost, it showed that D agreements has better safety performance than either A or B in camouflage gateway replay attack, camouflage landing node attack and brute force attack. |
4楼2014-01-18 16:19:56













,不要用软件翻译,翻译完即送100金币,
回复此楼