其主要思想是把HLA功能在网格系统中实现,并充分利用网格系统提供的资源共享及动态分配、安全性和扩展性等HLA协议所不能够提供的特性。
The system implements the HLA functions with grid technologies that enable the features of resources sharing, dynamic allocation of resources, strong security, and good fault tolerance.
这个量子密钥传输协议在通信节点和控制中心之间通过多个GHZ对构建安全的密码分配系统。
The quantum communication network marries a variety of GHZ states to well establish the secure key distribution system employed in conjunction with the nodes and control centers.
理论分析表明这种密钥分配协议是安全可靠的。
Theory analysis shows that this kind of key code distribution's protocol is absolutely safe.
理论计算证明了量子密钥分配协议在这种攻击策略下仍具有足够的安全性。
It is shown that there is still an asymptotic perfect security of quantum key distribution under this attack strategy.
密钥分配协议是数据安全通讯的重要支持,但是一些协议在发生密钥泄露后,即使用新的安全密钥取代,仍有可能遭受再次攻击。
The key distribution protocols are important support for safe data communication, but some of them may be attacked again even adopt new safe key after key betrayed.
详细分析了UMTS认证和密钥分配协议的过程以及协议的安全性,找出协议中存在的弱点和可能的攻击,提出了公钥加密协议的改进方法。
This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.
本文分析了IMS认证与密钥分配协议的过程,找出了认证协议中的安全缺陷,并给出了攻击者可能进行的攻击。
In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.
采用BAN逻辑对该协议进行形式化分析表明:协议达到了认证和密钥分配的目标,具有较强的安全性。
Used BAN logic, the objective and the security of this protocol are proved by formal analysis process.
采用BAN逻辑对该协议进行形式化分析表明:协议达到了认证和密钥分配的目标,具有较强的安全性。
Used BAN logic, the objective and the security of this protocol are proved by formal analysis process.
应用推荐