±±¾©Ê¯ÓÍ»¯¹¤Ñ§Ôº2026ÄêÑо¿ÉúÕÐÉú½ÓÊÕµ÷¼Á¹«¸æ
²é¿´: 707  |  »Ø¸´: 3
±¾Ìû²úÉú 1 ¸ö ·­ÒëEPI £¬µã»÷ÕâÀï½øÐв鿴

liushaojiang

Òø³æ (СÓÐÃûÆø)

[ÇóÖú] ÇóÖú·­ÒëÒ»¶ÎÕªÒª£¬·­ÒëÍêËÍ100½ð±Ò£¡

¼±ÇóºÃÈË·­ÒëÒ»¶ÎÕªÒª£¬×Ô¼ºÓ¢ÎÄˮƽ²»¹ý¹Ø°¡£¬²»ÒªÓÃÈí¼þ·­Ò룬·­ÒëÍê¼´ËÍ100½ð±Ò£¬
Òª·­ÒëµÄÕªÒª£ºÎªÁËÇ¿»¯ºÏ·¨Óû§Í¨¹ýÉí·ÝÑéÖ¤»ñÈ¡´«¸ÐÆ÷ÍøÂç½ÚµãÊý¾ÝʱµÄ°²È«ÐÔÄÜ£¬»ùÓÚÒÑÓеÄAЭÒéºÍBЭÒéµÄÑо¿»ù´¡£¬Ìá³öÒ»ÖÖ»ìºÏCЭÒéµÄÎÞÏß´«¸ÐÆ÷ÍøÂçÉí·ÝÑé֤ЭÒé(D)¡£¸ÃЭÒé¾ßÓÐAЭÒéͨ¹ýµ¥ÏòÉ¢Áк¯ÊýºÍÒì»òÔËËãÀ´ÊµÏÖ¼ÓÃÜ/½âÃܵÄÐÔÄÜ£¬²¢¾ßÓÐBЭÒé²ÉÓÃΨһµÄÖÇÄÜ¿¨½øÐÐÉí·ÝÑéÖ¤µÄÌØµã£¬Ïà±ÈÕâÁ½¸öЭÒ飬DЭÒéÔö¼ÓÁËÃÜÂë±ä¸ü½×¶Î£¬²¢ÇÒÔÚЭÒéµÄÑéÖ¤½×¶ÎÔö¼ÓÁ˵Ǽ½ÚµãÓë´«¸ÐÆ÷½ÚµãÖ®¼äµÄ»¥ÏàÑéÖ¤²Ù×÷£¬¼ÓÇ¿ÁËÉí·ÝÑéÖ¤µÄ°²È«ÐÔ¡£Í¨¹ý½øÐÐЭÒéµÄ°²È«ÌØÐԶԱȺͼÆËã³É±¾·ÖÎö£¬±íÃ÷DЭÒéÏà±ÈAЭÒéºÍBЭÒ飬¿ÉÒÔµÖÓùÎ±×°Íø¹ØÖطŹ¥»÷£¬Î±×°µÇ½½Úµã¹¥»÷ÒÔ¼°ÂùÁ¦¹¥»÷£¬²¢¾ßÓиüºÃµÄ°²È«ÐÔÄÜ¡£

» ²ÂÄãϲ»¶

ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

feixiaolin

ÈÙÓþ°æÖ÷ (ÎÄ̳¾«Ó¢)

ÓÅÐã°æÖ÷

¡¾´ð°¸¡¿Ó¦Öú»ØÌû

¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ...
liushaojiang: ½ð±Ò+100, ·­ÒëEPI+1, ¡ï¡ï¡ï¡ï¡ï×î¼Ñ´ð°¸, ·Ç³£¸Ðл 2014-01-18 19:30:24
Our protocol agreement has the performance of one-way hash function and XOR to implement encryption /decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. By comparing characteristics of security features and the calculating cost, it showed that D agreements has better safety performance than either A or B in camouflage gateway replay attack, camouflage landing node attack and brute force attack.
2Â¥2014-01-18 15:25:02
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

feixiaolin

ÈÙÓþ°æÖ÷ (ÎÄ̳¾«Ó¢)

ÓÅÐã°æÖ÷

¡¾´ð°¸¡¿Ó¦Öú»ØÌû

// ¸Õ²ÅÂäÏÂÁ˵ÚÒ»²¿·Ö£¬ÏÖ²¹È«¡£
For strengthening the safety performance of legitimate users access network node data through authentication, , it was proposed that a wireless sensor network authentication protocol (D) which combining protocol (C) based on analysis of existing protocols A and B. Our protocol agreement has the performance of one-way hash function and XOR to implement encryption / decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. Our protocol agreement has the performance of one-way hash function and XOR to implement encryption /decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. By comparing characteristics of security features and the calculating cost, it showed that D agreements has better safety performance than either A or B in camouflage gateway replay attack, camouflage landing node attack and brute force attack.
3Â¥2014-01-18 15:33:34
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

feixiaolin

ÈÙÓþ°æÖ÷ (ÎÄ̳¾«Ó¢)

ÓÅÐã°æÖ÷

For strengthening the safety performance of legitimate users access network node data through authentication, , it was proposed that a wireless sensor network authentication protocol (D) which combining protocol (C) based on analysis of existing protocols A and B. Our protocol agreement has the performance of one-way hash function and XOR to implement encryption /decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. By comparing characteristics of security features and the calculating cost, it showed that D agreements has better safety performance than either A or B in camouflage gateway replay attack, camouflage landing node attack and brute force attack.
4Â¥2014-01-18 16:19:56
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû
Ïà¹Ø°æ¿éÌø×ª ÎÒÒª¶©ÔÄÂ¥Ö÷ liushaojiang µÄÖ÷Ìâ¸üÐÂ
×î¾ßÈËÆøÈÈÌûÍÆ¼ö [²é¿´È«²¿] ×÷Õß »Ø/¿´ ×îºó·¢±í
[¿¼ÑÐ] 295Çóµ÷¼Á +15 xndjjj 2026-04-04 16/800 2026-04-06 23:07 by chenzhimin
[¿¼ÑÐ] 277Çóµ÷¼Á +3 Äß½¨Éè 2026-04-06 3/150 2026-04-06 22:39 by qlm5820
[¿¼ÑÐ] 327Çóµ÷¼Á +5 Xxjc1107. 2026-04-06 5/250 2026-04-06 21:43 by dongzh2009
[¿¼ÑÐ] ²ÄÁÏר˶322 +11 ¹þ¹þ¹þºðºðºð¹þ 2026-04-05 11/550 2026-04-06 14:07 by lqwchd
[¿¼ÑÐ] ר˶0854³õÊÔ¿¼²Ä¿Æ»ù£¬Çóµ÷¼Á +6 3220548044 2026-04-06 9/450 2026-04-06 10:26 by barlinike
[¿¼ÑÐ] Ò»Ö¾Ô¸Î人Àí¹¤´óѧ-085601²ÄÁϹ¤³Ì£¨×¨Ë¶£©-×Ü·Ö353Çóµ÷¼Á +3 2626262626li 2026-04-02 3/150 2026-04-06 09:08 by Î޼ʵIJÝÔ­
[¿¼ÑÐ] 0860 Çóµ÷¼Á Ò»Ö¾Ô¸¹ú¿Æ´ó 348 ·Ö +3 WiiiP 2026-04-03 3/150 2026-04-05 17:43 by Ecowxq666£¡
[¿¼ÑÐ] ²ÄÁÏר˶322·Ö +11 ¹þ¹þ¹þºðºðºð¹þ 2026-04-02 11/550 2026-04-04 23:37 by ÓÀ×ÖºÅ
[¿¼ÑÐ] 085602 ÕÒµ÷¼Á +4 ÄæÊ±Õë¿ìÀÖ 2026-04-02 4/200 2026-04-04 19:32 by À¶ÔÆË¼Óê
[¿¼ÑÐ] Çóµ÷¼Á +3 ffyyu 2026-04-02 3/150 2026-04-04 19:03 by À¶ÔÆË¼Óê
[¿¼ÑÐ] 306Çóµ÷¼Á +3 hybÉÏÃû¹¤ 2026-04-02 3/150 2026-04-04 18:12 by ÈÈÇéɳĮ
[¿¼ÑÐ] 266Çóµ÷¼Á +8 ѧԱ97LZgn 2026-04-03 8/400 2026-04-04 09:02 by 20021109
[¿¼ÑÐ] µ÷¼Á0855-288 +5 xÐܶþa 2026-04-03 5/250 2026-04-04 00:19 by Öí»á·É
[¿¼ÑÐ] ר˶085601Çóµ÷¼Á +7 suyifei 2026-04-03 8/400 2026-04-03 14:00 by ÐÀϲ777
[¿¼ÑÐ] µ÷¼Á +3 osbbx 2026-04-02 3/150 2026-04-03 07:47 by cc8418
[¿¼ÑÐ] 285Çóµ÷¼Á +14 AZMK 2026-04-02 14/700 2026-04-02 15:54 by ÉϾÅÌìÀ¿Ô£¨ºÃÔ
[¿¼ÑÐ] 372Çóµ÷¼Á +3 jjÓ¿77 2026-04-02 3/150 2026-04-02 09:57 by olim
[¿¼ÑÐ] Ò»Ö¾Ô¸9³õÊÔ366 ±¾Ë«·ÇÇóµ÷¼Á +4 ÔËÆøÀ´µÃÈôÓÐËÆÎ 2026-04-02 4/200 2026-04-02 09:56 by guanxin1001
[˶²©¼ÒÔ°] ¿¼Ñе÷¼Á +5 ÂæÍÕÄÐÈË 2026-04-01 5/250 2026-04-01 14:28 by syjjj0321
[¿¼ÑÐ] 339Çóµ÷¼Á +5 zjjkt 2026-03-31 5/250 2026-04-01 09:18 by JourneyLucky
ÐÅÏ¢Ìáʾ
ÇëÌî´¦ÀíÒâ¼û