• 分析表明协议可以保证网络在线支付交易安全性原子性、可确认性公平性

    Analysis shows that this protocol guarantees the security, atomicity, accountability and impartiality of network online payment.

    youdao

  • BA N逻辑一种用于分析密码协议安全性逻辑。

    BAN family of logic is used to analyze the security of cryptographic protocols.

    youdao

  • 通过BAN逻辑分析证明了改进协议安全性

    By BAN logic analysis, the security of this new protocol is proved.

    youdao

  • 分析结果表明协议具有安全性匿名性、可信性抗攻击性

    The analysis shows that this protocol is safe, anonymous, trusted, attack-resistant, etc.

    youdao

  • 实例证明扩展后模型方法能够精确地分析描述电子商务安全协议安全性能够应用更广泛领域

    It has been proven by instances that the extended model and method can better analyze and describe the security of e-commerce security protocol, and be applied in wider fields.

    youdao

  • 相应的安全性分析明确给出了考虑攻击时,改进认证协议以前的协议更加强健。

    The security analyses show that the improved authentication protocol is much stronger against these three kinds of attacks than the traditional protocol.

    youdao

  • 分析协议安全性性能

    The security and performance of the protocol are analyzed.

    youdao

  • 本文提出面向消息中间件的分布式认证协议给出协议内容形式化描述以及安全性分析

    This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.

    youdao

  • 安全性分析证明协议可以可信计算环境保证密钥交换机密性可靠性,同时还可以保证主机完整性与主机匿名性

    The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.

    youdao

  • 提出一种新的安全协商机制用于SIP实体之间进行安全协议选择给出了相应安全性分析

    A new negotiation mechanism for the selection of security protocols among SIP entities was put forward, and moreover the corresponding security analysis was provided.

    youdao

  • 文中详细分析讨论了协议性能包括安全性、不可否认以及协议运行效率

    Moreover, the performances of the proposed protocol, including the security, the non-repudiation and the running efficiency, are analyzed and discussed in detail.

    youdao

  • 采用BAN认证逻辑协议安全性进行形式化证明协议计算复杂性进行了定性分析

    Then the formalized security proof of the protocol using BAN authentication logic, and the qualitative analysis about its computing complexity are given.

    youdao

  • 主要安全性方面两个协议进行比较分析

    These two protocols are compared and analyzed mainly in security.

    youdao

  • 提出一种新颖的形式化方法可以用于分析电子商务协议安全例如可追究性公平性

    A formal method which can be used to analyze security properties such as accountability and fairness in electronic commerce protocols is presented.

    youdao

  • 首先两个基于验证元三方口令密钥交换协议进行安全性分析指出它们不安全的。

    This paper first presents the security analysis of two verifier-based password-authenticated key exchange protocols for three-party and points out that they are both insecure.

    youdao

  • 文章简述SSLv3.0分层结构协议状态握手协议加密参数计算安全性做出分析

    This article briefly states the layer structure, the states, handshake protocol and cryptographic calculation of SSL V3.0, and analyses its security.

    youdao

  • 分析协议安全性保证协议公平

    The security of the protocol is analyzed and the fairness of it is guaranteed.

    youdao

  • 与此相应就是人们协议安全性更加关注尤其是特殊环境下如何建模分析安全协议显得尤为重要。

    People pay more attention on the security of protocols, especially in how to model and analyze security protocols in special environment.

    youdao

  • 文章设计了一个新的椭圆曲线密钥交换协议分析安全性证明了在ECDDHP前提下,协议安全AK协议

    We propose a new elliptic curve key-exchange protocol, analyze its security and prove that assuming ECDDHP is hard to solve, it is a secure AK protocol.

    youdao

  • 首先论述了安全性概念分析WAP安全的实现模型;重点讨论WAP安全协议WTLS原理

    The paper describes the conception of security and analyses the implementation of the security for WAP with emphasis on the principle of security layer of WAP protocols (WTLS).

    youdao

  • 本文详细描述了系统各个协议,并给出了相应安全性证明效率分析

    The details of each protocol in our new E-cash system are described thoroughly. In addition, the security proofs and efficiency analysis...

    youdao

  • 本文详细描述了系统各个协议,并给出了相应安全性证明效率分析

    The details of each protocol in our new E-cash system are described thoroughly. In addition, the security proofs and efficiency analysis are given in...

    youdao

  • 详细分析了UMTS认证密钥分配协议过程以及协议安全性,找出协议中存在弱点和可能的攻击,提出了公钥加密协议的改进方法。

    This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.

    youdao

  • 采用BAN逻辑协议进行形式化分析表明协议达到了认证密钥分配目标,具有较强的安全性

    Used BAN logic, the objective and the security of this protocol are proved by formal analysis process.

    youdao

  • 其次UAP协议进行安全分析由于确认密钥完全依赖于服务器的长期因此具有前向保密性密钥泄漏的安全性

    Secondly, the UAP protocol is analysed, because the key confirmation completely lies on the long-term private key, so it does not achieve forward secrecy, and resists key-compromise impersonation.

    youdao

  • 本文研究了认证领域的相关问题常见认证协议的原理及其安全性进行了深入分析

    This thesis mainly concerns about certification related issues, giving some introduction and analyzation on several well known certification protocols.

    youdao

  • 分析网络互连协议TCP/IP协议存在安全问题,以及由此产生的网络不安全性

    This paper analyzes the security problems of the TCP/IP suite and the insecurity of Internet.

    youdao

  • 一些研究人员密码协议分析引入形式化方法通过建立形式模型自动检测工具分析密码协议安全性取得较大的成功。

    Some researchers introduced formal methods for analyzing cryptographic protocols, and achieved many significant results by building formal models and automatic verifying tools.

    youdao

  • 一些研究人员密码协议分析引入形式化方法通过建立形式模型自动检测工具分析密码协议安全性取得较大的成功。

    Some researchers introduced formal methods for analyzing cryptographic protocols, and achieved many significant results by building formal models and automatic verifying tools.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定