• 我们介绍一个密码协议计算模型

    We present a model of computation for cryptographic protocols.

    youdao

  • 网络安全一个非常重要因素就是密码协议

    A very important factor of network security is cryptographic protocols.

    youdao

  • 最后提出了设计密码协议注意的两点策略

    Finally, two strategies to be paid attention to are put forward when cryptographic protocol is designed.

    youdao

  • 空间模型一种新兴密码协议形式化分析工具

    Strand space model is a new formal analysis tool to the analysis of cryptogram protocol.

    youdao

  • 密码协议分析设计基础进行形式化建模

    The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.

    youdao

  • 分布式乘法计算协议应用很广泛基础密码协议

    Distributed multiplication computation protocols are widely used as basic cryptographic protocols.

    youdao

  • 这种改进方案其它带有噪声量子密码协议同样适用

    The improvement we present can be applied to other quantum cryptographic protocol with noise.

    youdao

  • BA N逻辑一种用于分析密码协议安全性逻辑。

    BAN family of logic is used to analyze the security of cryptographic protocols.

    youdao

  • 空间理论一种新兴的用于密码协议形式化分析方法

    Strand space theory is a method for stating and proving correctness properties for cryptographic protocols.

    youdao

  • 算法基于多重密码协议快速运作很有效

    The algorithm is useful to speed up the operation for some cryptographic protocols based on multiple exponentiation.

    youdao

  • 因此密码协议设计密码协议分析信息安全领域难题

    So the design and analysis of cryptographic protocols are the troubles of information security.

    youdao

  • 第三部分应用推广构造攻击方法指导密码协议设计

    The third part is to apply generalized constructing attack method to guide design of cryptographic protocols.

    youdao

  • 因此密码协议设计密码协议分析信息安全领域难题。

    The design and analysis of cryptographic protocols are notoriously complex and error prone.

    youdao

  • 签名体制保证参与者匿名性基本的、重要密码协议

    Blind signature schemes, an important cryptographic primitive, are useful in protocols that guarantee the anonymity of the participants.

    youdao

  • 众所周知设计正确安全密码协议一项容易出错任务

    It is well known that designing correct and secure cryptographic protocols is an error-prone task.

    youdao

  • 本文主要研究线性配对函数构造新的密码协议方面应用

    This paper mainly does some research in applications of constructing new cryptographic protocols with bilinear pairings.

    youdao

  • 其次,分析方法与密码协议攻击者能力具体形式化描述无关

    The formalism is independent of the concrete formalization of a protocol or attackers' possible behaviors.

    youdao

  • (安全远程密码协议)种安全的新型密码鉴别密钥交换协议

    SRP (the secure remote password protocol) is a new secure password authentication and key-exchange protocol.

    youdao

  • 利用RS两锁密码协议构造一种非对称公钥叛逆者追踪方案

    By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.

    youdao

  • 人们提出多种密码协议分析方法BAN逻辑其中重要的一种。

    There are many ways proposed to analyze the security protocol, the BAN-like logic is one of the important ways.

    youdao

  • 工作表明基于博弈ATL逻辑传统CTL适合描述分析密码协议

    These works indicate that the ATL logic based on game is more suitable to describe and analyze cryptographic protocols than traditional CTL.

    youdao

  • 这个协议解决可信第三性能瓶颈问题一个更为有效的安全密码协议

    It is a more efficient and secure protocol, which solves the bottleneck problem of trusted third party.

    youdao

  • 密码协议必须满足安全属性的需求,对密码协议进行形式化规范需要证明其满足属性。

    The cryptographic protocol should always satisfy security properties, so the formal specification should give the corresponding proof method.

    youdao

  • 形式化分析由于精炼、简洁无二义性逐步成为分析密码协议一条可靠准确途径

    Because of its compactness, fineness and unambiguity, formal analysis of cryptographic protocol has been an efficient and correct method step by step.

    youdao

  • 本文对这三种密码协议执行时间结构特性以及实现分析软件复杂度给出了客观的评估。

    The thesis also objectively evaluates the performance of time delay, structure properties and software complexity of the above three cryptographic protocols.

    youdao

  • 结果表明基于身份的数字签名方案可以作为安全的密码语用于构建复杂密码协议

    This result shows that an identity-based signature scheme can be used as a primitive block to design more complicated cryptographic protocols.

    youdao

  • 结果表明利用符号模型检测方法分析发现密码协议重放攻击的漏洞种行之有效的方法

    Results show that the method using symbol model checker can discover replay attacks upon some cryptographic protocols and is effective.

    youdao

  • 目前密码系统大量使用基于公钥密码协议,这些协议安全性直接影响着网络系统的安全。

    Today we have seen more and more public key protocols use in networked and distributed systems, so we must select an secure public key protocol otherwise it will jeopardy the secrecy of networks.

    youdao

  • 采用近世代数时序逻辑方法定义了形式化描述语言形式化描述密码协议分层安全需求

    Using temporal logic and algebra, a formal requirement language was presented and used to describe the formal hierarchy requirements for cryptographic protocols.

    youdao

  • 利用形式化分析密码协议方法检测密码协议潜在的安全漏洞,已成为密码一个新的研究方向

    It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定