Design and implementation approaches for IKE protocols in the security VPN server are studied in this paper.
研究了安全VPN服务器中ike协议的设计与实现方法。
The key technology of mobile value-added services is to design protocols, which can meet the poor computing power as well as being security.
移动通信增值服务的关键技术之一就是设计既满足较差计算性能又具有良好安全性的协议。
The logic can be used not only to analyze security protocols, but also to design security protocols.
该逻辑不但可以用来分析安全协议,而且可以用来设计安全协议。
However, design of cryptographic protocols is a very micromesh job, because any tiny mistake may damage security of the protocol.
遗憾的是,加密协议的设计是一项非常细致的工作,任何细小的错误都可能会影响到协议的安全功能。
There exist many logics. Some of them may be only used to analyze security protocols, and the others may be only used to design security protocols.
现有的逻辑,有的只可用于分析安全协议,而有的则只可用于设计安全协议。
The design and the security of electronic commerce protocols are keys of their theories and techniques.
电子商务协议的设计和安全性成为电子商务最核心的理论和最关键的技术。
So the design and analysis of cryptographic protocols are the troubles of information security.
因此密码协议设计和密码协议分析是信息安全领域的难题。
The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.
密码协议分析与设计的基础是对其进行形式化建模。
The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.
密码协议分析与设计的基础是对其进行形式化建模。
应用推荐