在设计阶段,我们重新评估这些东西,并把它们对应到设计机制中,这些设计机制是根据持续性(表8)、安全性(表9)和遗留界面(表10)所需的分析做出的特殊解决方案。
In design, we reevaluate and map these into design mechanisms that are specific solutions to the analysis needs for persistence (Table 8), security (Table 9), and legacy interface (Table 10).
首先对两个基于验证元的三方口令密钥交换协议进行了安全性分析,指出它们都是不安全的。
This paper first presents the security analysis of two verifier-based password-authenticated key exchange protocols for three-party and points out that they are both insecure.
应用推荐