期刊文献+
共找到1,866篇文章
< 1 2 94 >
每页显示 20 50 100
One-time fertilization at first flowering improves lint yield and dry matter partitioning in late planted short-season cotton 被引量:9
1
作者 LUO Hong-hai WANG Qiang +3 位作者 ZHANG Jie-kun WANG Lei-shan LI Ya-bing YANG Guo-zheng 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2020年第2期509-517,共9页
Cotton producers have substantially reduced their inputs(labor,nutrients,and management)mainly by adopting a shortseason cropping management that is characterized by late sowing,high density,and reduced fertilization ... Cotton producers have substantially reduced their inputs(labor,nutrients,and management)mainly by adopting a shortseason cropping management that is characterized by late sowing,high density,and reduced fertilization with one-time application at the first bloom stage without lint yield reduction.However,it has been hypothesized that one-time fertilization at an earlier growth stage could be a more effective and economic management practice.A two-year field experiment was conducted by applying five fertilizer one-time fertilization at 0(FT1),5(FT2),10(FT3),15(FT4),and 20(FT5)days after the first flower appeared in the field and one three-split fertilizer application taken as the conventional control(FT6),making six treatments altogether.Cotton growth period,biomass accumulation,yield,and its formation were quantified.The results showed that the one-time fertilization did not affect the cotton growth progress as compared to FT6,however,the total crop cycles for FT3–FT5 were 3 days shorter.FT1 produced the highest cotton lint yield(1396 kg ha–1),which was similar to the FT6 but higher than the other treatments,and could be attributed to more bolls per unit area and higher lint percentage.Cotton yield was positively correlated with cotton plant biomass accumulated.FT1 had both the highest average(VT)(193.7 kg ha–1 d–1)and the highest maximum(VM)(220.9 kg ha–1 d–1)rates during the fast biomass accumulation period.These results suggest that one-time fertilizer application at the first flower stage might be an adjustment that is more effective than at first bloom,and allowed for easier decision making for application date due to non counting of plants with flowers is needed. 展开更多
关键词 one-time fertilization first flower cotton biomass accumulation yield
在线阅读 下载PDF
One-Time Rational Secret Sharing Scheme Based on Bayesian Game 被引量:8
2
作者 TIAN Youliang MA Jianfeng +2 位作者 PENG Changgen CHEN Xi JI Wenjiang 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期430-434,共5页
The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-... The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-out-of-2 rational secret sharing based on Bayesian game and considering different classes of protocol parties, we propose a 2-out-of-2 secret sharing scheme to solve cooperative problem of a rational secret sharing scheme being played only once. Moreover, we prove that the strategy is a perfect Bayesian equilibrium, adopted only by the parties in their decision-making according to their belief system (denoted by the probability distribution) and Bayes rule, without requiring simultaneous channels. 展开更多
关键词 rational secret sharing one-time rational secret sharing Bayesian game perfect Bayesian equilibrium
原文传递
One-time sintering process to modify xLi2MnO3(1-x)LiMO2 hollow architecture and studying their enhanced electrochemical performances 被引量:3
3
作者 Renheng Wang Yiling Sun +5 位作者 Kaishuai Yang Junchao Zheng Yan Li Zhengfang Qian Zhenjiang He Shengkui Zhong 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2020年第11期271-279,共9页
To solve the critical problems of lithium rich cathode materials, e.g., structure instability and short cycle life, we have successfully prepared a ZrO2-coated and Zr-doping xLi2MnO3·(1–x)LiMO2 hollow architectu... To solve the critical problems of lithium rich cathode materials, e.g., structure instability and short cycle life, we have successfully prepared a ZrO2-coated and Zr-doping xLi2MnO3·(1–x)LiMO2 hollow architecture via one-time sintering process. The modified structural materials as lithium-ion cathodes present good structural stability and superior cycle performance in LIBs. The discharge capacity of the ZrO2-coated and Zr-doped hollow pristine is 220 mAh g-1 at the 20th cycle at 0.2 C(discharge capacity loss, 2.7%)and 150 m Ah g-1 at the 100 th cycle at 1 C(discharge capacity loss, 17.7%), respectively. However, hollow pristine electrode only delivers 203 m Ah g-1 at the 20 th cycle at 0.2 C and 124 mAh g-1 at the 100 th cycle at 1 C, respectively, and the corresponding to capacity retention is 92.2% and 72.8%, respectively.Diffusion coefficients of modified hollow pristine electrode are much higher than that of hollow pristine electrode after 100 cycles(approach to 1.4 times). In addition, we simulate the adsorption reaction of HF on the surface of ZrO2-coated layer by the first-principles theory. The calculations prove that the adsorption energy of HF on the surface of ZrO2-coated layer is about-1.699 e V, and the ZrO2-coated layer could protect the hollow spherical xLi2MnO3·(1–x)LiMO2 from erosion by HF. Our results would be applicable for systematic amelioration of high-performance lithium rich material for anode with the respect of practical application. 展开更多
关键词 Lithium rich cathode materials one-time sintering process Coated and doped Electrochemical performances First-principles calculations
在线阅读 下载PDF
Cryptanalysis of the One-Time Proxy Signature Scheme Used in Mobile Agents 被引量:1
4
作者 FUXiao-tong XIAOHong XIAOGuo-zhen 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期183-185,共3页
We ayptanalyze Kim et. al's one-time proxy signature scheme used in mobileagents, and then a successful forgery is introduced It is showed that a dishonest customer cansuccessfully forge a valid one-time proxy sig... We ayptanalyze Kim et. al's one-time proxy signature scheme used in mobileagents, and then a successful forgery is introduced It is showed that a dishonest customer cansuccessfully forge a valid one-time proxy signature by impersonating the stiver Furthermore, he canrequest the server with responsibility for the forged bidding information. 展开更多
关键词 CRYPTANALYSIS proxy signature one-time proxy signature
在线阅读 下载PDF
Design of 32 kbit one-time programmable memory for microcontroller units 被引量:1
5
作者 JEON Hwang-gon CHOI In-hwa +1 位作者 HA Pan-bong KIM Young-hee 《Journal of Central South University》 SCIE EI CAS 2012年第12期3475-3483,共9页
A 32 kbit OTP(one-time programmable)memory for MCUs(micro-controller units)used in remote controllers was designed.This OTP memory is used for program and data storage.It is required to apply 5.5V to BL(bit-line)and 1... A 32 kbit OTP(one-time programmable)memory for MCUs(micro-controller units)used in remote controllers was designed.This OTP memory is used for program and data storage.It is required to apply 5.5V to BL(bit-line)and 11V to WL(word-line)for a OTP cell of 0.35μm ETOX(EEPROM tunnel oxide)type by MagnaChip.We use 5V transistors on column data paths to reduce the area of column data paths since they require small areas.In addition,we secure device reliability by using HV(high-voltage)transistors in the WL driver.Furthermore,we change from a static logic to a dynamic logic used for the WL driver in the core circuit.Also,we optimize the WD(write data)switch circuit.Thus,we can implement them with a small-area design.In addition,we implement the address predecoder with a small-area logic circuit.The area of the designed 32 kbit OTP with 5V and HV devices is 674.725μm×258.75μm(=0.1745mm2)and is 56.3% smaller than that using 3.3V devices. 展开更多
关键词 one-time programmable memory micro controller unit EEPROM tunnel oxide small-area
在线阅读 下载PDF
A One-Time Pad Encryption Scheme Based on Efficient Physical-Layer Secret Key Generation for Intelligent IoT System 被引量:1
6
作者 Liquan Chen Kailin Cao +2 位作者 Tianyu Lu Yi Lu Aiqun Hu 《China Communications》 SCIE CSCD 2022年第7期185-196,共12页
The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random k... The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random keys for OTP.In this paper,we propose a joint SKG and OTP encryption scheme with the aid of a reconfigurable intelligent surface(RIS)to boost secret key rate.To maximize the efficiency of secure communication,we divide the process of secure transmission into two stages:SKG and then encrypted packet transmission.Meanwhile,we design an optimal algorithm for allocating time slots for SKG to maximize SKG efficiency without security risk.Furthermore,we design a key updating protocol based on our SKG scheme for OTP encryption.Simulation results verify that our scheme can generate keys securely and efficiently,and significantly improve the secure communication performance in an intelligent IoT system. 展开更多
关键词 physical layer security intelligent internet of things one-time pad reconfigurable intelligent surface
在线阅读 下载PDF
One-time Shaping Technological System of Lightweight Roof Greening 被引量:1
7
作者 殷金岩 许建新 +5 位作者 罗旭荣 骆华容 黎修东 唐巧玲 王玲玲 何新杰 《Agricultural Science & Technology》 CAS 2016年第6期1471-1474,共4页
Lightweight roof greening is an important way for improving urban ecological environment and has good ecological and social benefits, but the investment is- too-high for the investors. Therefore, it is necessary to im... Lightweight roof greening is an important way for improving urban ecological environment and has good ecological and social benefits, but the investment is- too-high for the investors. Therefore, it is necessary to improve the system of lightweight roof greening. This study introduced a lightweight roof greening mode with low cost, simple construction, rapid formation, good economic benefit and convenient curing. 展开更多
关键词 Lightweight roof greening one-time shaping technology Plant mat
在线阅读 下载PDF
Effect of Nucleating Agent on the Crystallization of Tailings Glass Ceramics Prepared by One-time Sintering
8
作者 刘军 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2009年第4期658-662,共5页
Glass ceramics was made by the one-time sintering method using the main raw material of iron tailings. On the basis of quaternary system of CaO-MgO-Al2O3-SiO2, using DTA, XRD and SEM, the effects of different nucleati... Glass ceramics was made by the one-time sintering method using the main raw material of iron tailings. On the basis of quaternary system of CaO-MgO-Al2O3-SiO2, using DTA, XRD and SEM, the effects of different nucleating agents and mixing amounts as well as heat treatment on the crystallization of railings glass ceramics were studied. The experimental results show that, nucleating agent and heat treatment are two necessary conditions for one-time sintering preparation of tailings glass ceramics namely, only adding nucleating agent or experiencing heat treatment, the quaternary system can not crystallize. The composite nucleating agent consisting of Cr2O3 and TiO2 can further lead to the crystallization of the CaO-MgO-A1203-SiO2 quaternary system at the lower temperature, with the major phase of diopside. In the range of mass content, 0%-4%, crystal intensity and crystal content grow. But when mass content is more than 4%, the crystal size will become coarser and the crystal distribution will be less regular. Different heat treatment regimes do not change the composition of the crystalline major phase in the glass ceramics crystallization of CaO-MgO-Al2O3-SiO2 system. In the range of 30-60 minutes, with the extension of nucleation and crystallization, crystallization degree enhanced, but if the holding time surpasses 60 minutes, the crystallization is worse. 展开更多
关键词 nucleating agent one-time sintering TAILINGS glass ceramics CRYSTALLIZATION
原文传递
A novel one-time-programmable memory unit based on Schottky-type p-GaN diode
9
作者 Chao Feng Xinyue Dai +4 位作者 Qimeng Jiang Sen Huang Jie Fan Xinhua Wang Xinyu Liu 《Journal of Semiconductors》 EI CAS CSCD 2024年第3期53-57,共5页
In this work,a novel one-time-programmable memory unit based on a Schottky-type p-GaN diode is proposed.During the programming process,the junction switches from a high-resistance state to a low-resistance state throu... In this work,a novel one-time-programmable memory unit based on a Schottky-type p-GaN diode is proposed.During the programming process,the junction switches from a high-resistance state to a low-resistance state through Schottky junction breakdown,and the state is permanently preserved.The memory unit features a current ratio of more than 10^(3),a read voltage window of 6 V,a programming time of less than 10^(−4)s,a stability of more than 108 read cycles,and a lifetime of far more than 10 years.Besides,the fabrication of the device is fully compatible with commercial Si-based GaN process platforms,which is of great significance for the realization of low-cost read-only memory in all-GaN integration. 展开更多
关键词 wide-bandgap semiconductor one-time programmable Schottky-type p-GaN diode read-only memory device
在线阅读 下载PDF
Evaluation of the Effectiveness and Safety of One-Time Endodontics in the Treatment of Chronic Apical Periodontitis with Sinus Tract in Pediatric Deciduous Teeth
10
作者 Yi Liu 《Journal of Clinical and Nursing Research》 2024年第6期111-116,共6页
Objective:To observe the effectiveness and safety of one-time endodontics in the treatment of chronic apical periodontitis with sinus tract in pediatric deciduous teeth.Methods:109 cases of children with chronic apica... Objective:To observe the effectiveness and safety of one-time endodontics in the treatment of chronic apical periodontitis with sinus tract in pediatric deciduous teeth.Methods:109 cases of children with chronic apical periodontitis with sinus tract in the deciduous teeth treated in our hospital from January 2022 to December 2023 were selected and grouped by the randomized numerical table method,with 54 cases in the experimental group and 55 cases in the control group.The experimental group was treated with one-time endodontics and the control group was treated with conventional endodontics.Results:After the treatment,the total effective rate of treatment was higher in the experimental group than in the control group(P<0.05);the incidence of adverse events was lower in the experimental group than in the control group(P<0.05);the satisfaction of the children's family members was higher in the experimental group than in the control group(P<0.05);the pain duration was lower in the experimental group than in the control group(P<0.05).Conclusion:In the experimental group,children with chronic apical periodontitis with sinus tract of the deciduous teeth were given one-time endodontic treatment,and the results of its implementation were relatively good. 展开更多
关键词 one-time endodontics Chronic apical periodontitis with sinus tract Pediatric deciduous teeth Therapeutic effectiveness SAFETY
暂未订购
TGI-FPR: An Improved Multi-Label Password Guessing Model
11
作者 Wei Ou Shuai Liu +3 位作者 Mengxue Pang Jianqiang Ma Qiuling Yue Wenbao Han 《Computers, Materials & Continua》 2025年第7期463-490,共28页
TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password secur... TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password security research.However,through an analysis of the vulnerable behavior of users when constructing passwords by combining popular passwords with their Personally Identifiable Information,we identified that the model fails to consider popular passwords and frequent substrings,and it uses overly broad personal information categories,with extensive duplicate statistics.To address these issues,we propose an improved password guessing model,TGI-FPR,which incorporates three semantic methods:(1)identification of popular passwords by generating top 300 lists from similar websites,(2)use of frequent substrings as new grammatical labels to capture finer-grained password structures,and(3)further subdivision of the six major categories of personal information.To evaluate the performance of the proposed model,we conducted experiments on six large-scale real-world password leak datasets and compared its accuracy within the first 100 guesses to that of TarGuess-I.The results indicate a 2.65%improvement in guessing accuracy. 展开更多
关键词 password analysis personally identifiable information frequent substring password guessing model
在线阅读 下载PDF
CMOS中PASSWORD的清除
12
作者 刘辉 吴赟 《微机发展》 1996年第2期14-15,共2页
本文介绍微机CMOS被加锁后的几种解锁方法
关键词 CMOS存储器 存储器 password CMOS
在线阅读 下载PDF
Password Pattern and Vulnerability Analysis for Web and Mobile Applications 被引量:1
13
作者 LI Shancang Imed Romdhani William Buchanan 《ZTE Communications》 2016年第B06期32-36,共5页
Text-based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Sh... Text-based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Shannon entropy, Guessing entropy and Minimum entropy. We show how to substantially improve upon the strength of passwords based on the analysis of text-password entropies. By analyzing the passwords datasets of Rockyou and 163.com, we believe strong password can be designed based on good usability, deployability, rememberbility, and security entropies. 展开更多
关键词 password strength security entropies password vulnerabilities
在线阅读 下载PDF
Simple and Efficient Password-Based Authenticated Key Exchange Protocol 被引量:1
14
作者 王立斌 潘嘉昕 马昌社 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期459-465,共7页
Password-based authenticated key exchange(PAKE) protocols are cryptographic primitives which enable two entities,who only share a memorable password,to identify each other and to communicate over a public unreliable n... Password-based authenticated key exchange(PAKE) protocols are cryptographic primitives which enable two entities,who only share a memorable password,to identify each other and to communicate over a public unreliable network with a secure session key.In this paper,we propose a simple,efficient and provably secure PAKE protocol based on Diffie-Hellman key exchange and cryptographic hash function.Our protocol is secure against dictionary attacks.Its security is proved based on the hardness of the computational Diffie-Hellman problem in the random oracle model. 展开更多
关键词 password authentication key exchange provable security
原文传递
AvoidPwd: A Mnemonic Password Generation Strategy Based on Keyboard Transformation 被引量:1
15
作者 Shunying Lyu Qian Yao Jianhua Song 《China Communications》 SCIE CSCD 2022年第10期92-101,共10页
Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the ... Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the primary method in the future due to their simplicity and low cost.Considering the security and usability of passwords,we propose AvoidPwd,which is a novel mnemonic password generation strategy that is based on keyboard transformation.AvoidPwd helps users customize a“route”to bypass an“obstacle”and choose the characters on the“route”as the final password.The“obstacle”is a certain word using any language and the keys adjacent to the“obstacle”are typed with the“Shift”key.A two-part experiment was conducted to examine the memorability and security of the AvoidPwd strategy with other three password strategies and three leaked password sets.The results showed that the passwords generated by the AvoidPwd strategy were more secure than the other leaked password sets.Meanwhile,AvoidPwd outperformed the KbCg,SpIns,and Alphapwd in balancing security and usability.In addition,there are more symbols in the character distribution of AvoidPwd than the other strategies.AvoidPwd is hopeful to solve the security problem that people are difficult to remember symbols and they tend to input letters and digits when creating passwords. 展开更多
关键词 password generation strategy password security mnemonic passwords
在线阅读 下载PDF
Implementation of a TPM-Based Security Enhanced Browser Password Manager 被引量:1
16
作者 HE Yuchen WANG Rui SHI Wenchang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期56-62,共7页
In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which... In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable.Abstract: In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable. 展开更多
关键词 trusted platform module(TPM) password manager trusted encryption decryption
原文传递
Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications 被引量:2
17
作者 Li Wenmin Wen Qiaoyan Su Qi Zhang Hua Jin Zhengping 《China Communications》 SCIE CSCD 2012年第1期64-72,共9页
To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnera... To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications. 展开更多
关键词 mobile applications key exchange password elliptic curve cryptosystem SECURITY
在线阅读 下载PDF
Simple Three-Party Password Authenticated Key Exchange Protocol 被引量:1
18
作者 罗乃维 叶国晖 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期600-603,共4页
Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on pas... Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system e?ciency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness. 展开更多
关键词 authentication CRYPTANALYSIS error correction code (ECC) simple three-party password authenticated key exchange (S-3PAKE) security undetectable on-line dictionary attack
原文传递
CM-Droid: Secure Container for Android Password Misuse Vulnerability 被引量:1
19
作者 Wen Zhang Keyue Li +2 位作者 Tianyang Li Shaozhang Niu Zhenguang Gao 《Computers, Materials & Continua》 SCIE EI 2019年第4期181-198,共18页
Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity protection.However... Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity protection.However,application developers do not have the knowledge of cryptography,thus the cryptographic algorithm may not be used correctly.As a result,security vulnerabilities are generated.Based on the previous studies,this paper summarizes the characteristics of password misuse vulnerability of Android application software,establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability.And on this basis,this paper designs and implements a secure container for Android application software password misuse vulnerability:CM-Droid. 展开更多
关键词 password misuse evaluation model secure container dynamic repair
在线阅读 下载PDF
A Password-Based Secure Communication Scheme in Battlefields for Internet of Things 被引量:1
20
作者 张华 高飞 +1 位作者 温巧燕 金正平 《China Communications》 SCIE CSCD 2011年第1期72-78,共7页
Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et ... Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et al. proposed the first constant-round password-based group key ex- change with different passwords for such net- works. In 2008, Nam et al. discovered the short- comings of the scheme, and modified it. But the works only provide the group key. In this paper, we propose a password-based secure communication scheme for the loT, which could be applied in the battlefield communication systems and support dy- namic group, in which the nodes join or leave. By performing the scheme, the nodes in the heteroge- neous MANET can realize secure broadcast, secure unicast, and secure direct communication across realms. After the analyses, we demonstrate that the scheme is secure and efficient. 展开更多
关键词 Internet of Things password BROADCAST UNICAST direct communication across realms
在线阅读 下载PDF
上一页 1 2 94 下一页 到第
使用帮助 返回顶部