相似文献/References:
[1]沈武 王天芹 杨帅.基于门限完全分布式密钥管理方案[J].计算机技术与发展,2010,(02):175.
SHEN Wu,WANG Tian-qin,YANG Shuai.Fully- Distributed Key Management Scheme Based on Threshold[J].,2010,(09):175.
[2]叶晓国 肖甫 孙力娟 王汝传.基于NS-2的航空器通信仿真模块的设计与实现[J].计算机技术与发展,2009,(07):28.
YE Xiao-guo,XIAO Fu,SUN Li-juan,et al.Design and Implementation of Aircraft Communication Simulation Module Based on NS- 2[J].,2009,(09):28.
[3]王华顺 孙力娟 肖甫 王汝传.卫星网络传输层协议分析与改进[J].计算机技术与发展,2009,(08):58.
WANG Hua-shun,SUN Li-juan,XIAO Fu,et al.Improvement and Analysis of Transport Layer Protocol on Satellite Network[J].,2009,(09):58.
[4]赵晓峰 叶震.几种数据库加密方法的研究与比较[J].计算机技术与发展,2007,(02):219.
ZHAO Xiao-feng,YE Zhen.Research and Comparison of Several Database Encryption Technologies[J].,2007,(09):219.
[5]郑彦 王汝传 高冉 孙力娟.无线传感器网络中密钥管理机制约束因素研究[J].计算机技术与发展,2006,(10):118.
ZHENG Yan,WANG Ru-chuan,GAO Ran,et al.Constrains of Key Management in Wireless Sensor Network[J].,2006,(09):118.
[6]吴杨 矫文成 潘艳辉 李华.卫星网络加密算法安全性分析与攻击建模[J].计算机技术与发展,2011,(06):140.
WU Yang,JIAO Wen-cheng,PAN Yan-hui,et al.Analysis of Cipher Security and Cipher Attack Modeling in Satellite Network[J].,2011,(09):140.
[7]张毅 肖四友.X-IDEA算法在手机图文信息安全传输中应用研究[J].计算机技术与发展,2012,(04):250.
ZHANG Yi,XIAO Si-you.Study on Mobile Communication Image-Text Security Transport Based on X-IDEA Algorithm[J].,2012,(09):250.
[8]周星,刘军,董春冻,等.卫星网络安全路由目标研究[J].计算机技术与发展,2013,(07):163.
ZHOU Xing,LIU Jun,DONG Chun-dong,et al.Research on Satellite Network Secure Routing Objectives[J].,2013,(09):163.
[9]陈亚东,张涛,曾荣,等.密钥管理系统研究与实现[J].计算机技术与发展,2014,24(02):156.
CHEN Ya-dong,ZHANG Tao,ZENG Rong,et al.Research and Implementation of Key Management System[J].,2014,24(09):156.
[10]鲁蔚锋,尚春雷. 一种基于攻击概率的分布式传感网密钥管理方案[J].计算机技术与发展,2016,26(09):129.
LU Wei-feng,SHANG Chun-lei. A Key-management Scheme with Node Compromise Probability in Wireless Sensor Network[J].,2016,26(09):129.
[11]周星,刘军,董春冻,等.基于身份的卫星网络密钥管理方案[J].计算机技术与发展,2013,(11):148.
ZHOU Xing[],LIU Jun[],DONG Chun-dong[],et al.A Scheme of Identity-based Satellite Network Key Management[J].,2013,(09):148.