计算机科学技术
shared key
Two authenticated conference key agreement protocols are designed using identitybased signature scheme and identity-based Diffie-Hellman shared key.
分别利用基于身份的数字签名方案和基于身份的长期共享密钥设计了两个可认证会议密钥协商协议。
sharing key
The new agreement inherits the merits of former plans and does not affect the security fo follow-up sharing key even if the share key is exposed.
分析了预防该类攻击的防护策略并提出了一个改进的单/多认证密钥交换协议,新协议继承了以前方案的优点,但在共享密钥被泄露时,不会影响到后续共享密钥的安全性。
shared secret
电子、通信与自动控制技术
shared key
sharing key
Based on the security needs of wireless sensor network, and several key pre-distribution scheme for wireless sensor networks, this paper made an intensive study of key pre-distribution scheme and make some improvements in the prepare sharing key management.
本文根据无线传感器网络的安全需求,在几种传感器网络密钥预分配方案基础上,对传感器网络的预分配方案进行了较深入的探讨和研究,并在研究预共享密钥的基础上做了些改进。