1. YNU
  2. ´óѧ°¸ÄÚ
  3. ŽÚˆó»î„ÓÇéˆó
  4. ¥×¥ì¥¹¥ê¥ê©`¥¹Ò»ÓE
  5. ¡¾¥×¥ì¥¹¥ê¥ê©`¥¹¡¿ßh¸ô¤«¤é¤ÎIoT™CÆ÷ÖÆÓùÓÃ¥»¥­¥å¥¢¥·¥¹¥Æ¥à¤ò¹úëH˜ËœÊ»¯

¡¾¥×¥ì¥¹¥ê¥ê©`¥¹¡¿ßh¸ô¤«¤é¤ÎIoT™CÆ÷ÖÆÓùÓÃ¥»¥­¥å¥¢¥·¥¹¥Æ¥à¤ò¹úëH˜ËœÊ»¯

¡¾¥×¥ì¥¹¥ê¥ê©`¥¹¡¿ßh¸ô¤«¤é¤ÎIoT™CÆ÷ÖÆÓùÓÃ¥»¥­¥å¥¢¥·¥¹¥Æ¥à¤ò¹úëH˜ËœÊ»¯
±¾Ñ§¤«¤éÌá°¸¤·¤¿Technical Report¤ò¹úßB˜ËœÊ»¯™CévITU-T¤¬Õýʽ°kÐÐ

¡¡uedbetÌåÓý_uedbetÌåÓýͶע-²Ê¿ÍÍø²ÊƱÍƼö´óѧԺ­h¾³ÇéˆóÑо¿Ôº?Ïȶ˿Æѧ¸ßµÈÑо¿Ôº ËÄ·½í˜Ë¾½ÌÊÚ¤é¤ÎÑо¿¥°¥ë©`¥×¤¬¹úßBŒŸéT™Cév¤Î¹úëH늚ÝͨÐÅßBºÏ£¨ITU£©¤Ë¤ª¤±¤ë¹úëH˜ËœÊ»¯²¿éT£¨ITU-T£©¤ËÌá°¸¤·¤Æ¤¤¤¿ “Broadcast authentication schemes for IoT system” ¤¬2023Äê9ÔÂ5ÈÕTechnical Report¤È¤·¤Æ³ÐÕJ¤µ¤ì¡¢2024Äê2Ô¤˰kÐФµ¤ì¤Þ¤·¤¿¡£
¡¡±¾Ñо¿³É¹û¤ª¤è¤Ó¤½¤Î¹úëH˜ËœÊ»¯¤Ë¤è¤ê¡¢½ñáá¤Þ¤¹¤Þ¤¹»îÓ䬎ڤ¬¤ëIoT™CÆ÷¤Î°²È«¤«¤Ä„¿ÂʵĤÊÖÆÓù¤ª¤è¤Ó¹ÜÀí¤ÎŒg¬F¤ËØ•Ïפ¹¤ë¤³¤È¤¬ÆÚ´ý¤µ¤ì¤Þ¤¹¡£
¡¡±¾Ñо¿¤ª¤è¤Ó¤½¤Î¹úëH˜ËœÊ»¯¤Ï¡¢¾t„ÕʡίӚÑо¿?늲¨ÙYÔ´’ˆ´ó¤Î¤¿¤á¤ÎÑо¿é_°k¡¸ëŠ²¨¤ÎÓЄ¿ÀûÓäΤ¿¤á¤ÎIoT¥Þ¥ë¥¦¥§¥¢Ÿoº¦»¯/Ÿo™CÄÜ»¯¼¼ÐgµÈ¤Ëév¤¹¤ëÑо¿é_°k£¨Ñо¿´ú±íÕß¡¡uedbetÌåÓý_uedbetÌåÓýͶע-²Ê¿ÍÍø²ÊƱÍƼöÏȶ˿Æѧ¸ßµÈÑо¿Ôº¡¡IAS¿Í†T½ÌÊÚ ÖÐβ¿µ¶þ£©¡¹(ÁîºÍ2Äê¡«4Äê)¤Î³É¹û¤Ç¤¹¡£

¡¸Broadcast authentication schemes for IoT system¡¹£¨¹úëH늚ÝͨÐÅßBºÏ¥¦¥§¥Ö¥µ¥¤¥È£©Ð¤·¤¤¥¦¥£¥ó¥É¥¦¤¬é_¤­¤Þ¤¹

†–¤¤ºÏ¤ï¤»µ£µ±ÏÈ

­h¾³ÇéˆóÑо¿Ôº£¬Ïȶ˿Æѧ¸ßµÈÑо¿Ôº ½ÌÊÚ¡¡ËÄ·½ í˜Ë¾
¥á©`¥ë¥¢¥É¥ì¥¹£ºshikata-junji-rbynu.ac.jp

(µ£µ±£º¥ê¥ì©`¥·¥ç¥óÍÆßMÕn)


¥Ú©`¥¸¤ÎÏÈî^¤Ø

uedbetÌåÓý_uedbetÌåÓýͶע-²Ê¿ÍÍø²ÊƱÍƼö