• On the analysis of BAN-logic and some possible attacks, the protocol is secure.

    通过BAN逻辑及各种可能攻击分析证明协议是安全的。

    youdao

  • BAN logic can prove whether a protocol can reach expected target and find some defects in the protocol, which helps the protocol get further improvement.

    BAN逻辑可以证明协议是否能够达到预期目标,还能够发现协议存在一些缺陷,进一步改进提供参考

    youdao

  • Then the formalized security proof of the protocol using BAN authentication logic, and the qualitative analysis about its computing complexity are given.

    采用BAN认证逻辑协议安全性进行形式化证明协议的计算复杂性进行了定性分析

    youdao

  • The enhanced Kerberos protocol's validity was finally proved by BAN logic.

    最后使用BAN逻辑对该协议正确性进行证明

    youdao

  • By BAN logic analysis, the security of this new protocol is proved.

    通过BAN逻辑分析证明了改进协议安全性

    youdao

  • BAN logic has been by far the most widely used.

    BAN逻辑目前使用广泛的。

    youdao

  • As for the flaws of the SSL handshake protocol part in the SSL based security communication model, the thesis proposes a PMI based solution and analyzes the design by using the BAN logic.

    针对基于SSL安全通信模型中ssl握手协议部分访问控制方面的缺陷本文提出了一个基于pmi的全解决方案对改进设计进行分析BAN逻辑证明。

    youdao

  • Used BAN logic, the objective and the security of this protocol are proved by formal analysis process.

    采用BAN逻辑协议进行形式化分析表明:协议达到了认证密钥分配目标,具有较强的安全性

    youdao

  • At last, the author has analysed X. 509 protocol with BAN logic, has found two defects existing in this protocol, and has put forward the suggestion improved.

    最后作者BAN逻辑分析了X . 509协议发现了协议存在两个缺陷提出了改进建议

    youdao

  • BAN family of logic is used to analyze the security of cryptographic protocols.

    BA N逻辑一种用于分析密码协议安全性逻辑。

    youdao

  • To improve the BAN (Burrows, Abadi & Needham)logic, an analysis and design logic for authentication security was proposed based on the BSW (Buttyan, Staamann & Wilhelm) logic.

    针对BAN逻辑的局限性,在BSW逻辑的基础,提出一种针对认证安全性分析设计逻辑。

    youdao

  • After setting up the idealized protocol model, a process of formal analysis of this protocol is presented and the security is proved theoretically by using the BAN logic.

    通过建立协议理想化模型利用BAN逻辑形式化分析协议,在理论上证明安全性

    youdao

  • BAN logic is introduced in this paper, and the flaw in an authentication protocol is found. This implies that it is effective to analysis the authentication protocol using BAN logic.

    介绍BAN逻辑,并用一个认证协议进行了分析找到了认证协议的一些弱点,说明BAN逻辑来对认证协议进行分析有效的。

    youdao

  • There are many ways proposed to analyze the security protocol, the BAN-like logic is one of the important ways.

    人们提出多种密码协议分析方法BAN逻辑其中重要的一种。

    youdao

  • This paper designs a kind of mutual authentication scheme, which is based on the improved algorithm of HARN digital signature. Then it is proved by using BAN Logic.

    本文设计了一基于改进HARN数字签名算法双向认证方案利用BAN逻辑对此方案进行了验证

    youdao

  • However, an improvement proposal called Dual-way Challenge Handshake and Logoff Authentication was proposed, and a formal analysis was done on it with an improved BAN logic.

    提出并实现了双向挑战握手下线验证改进方案,并用一种改进BAN逻辑进行了形式化分析

    youdao

  • However, an improvement proposal called Dual-way Challenge Handshake and Logoff Authentication was proposed, and a formal analysis was done on it with an improved BAN logic.

    提出并实现了双向挑战握手下线验证改进方案,并用一种改进BAN逻辑进行了形式化分析

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定