分析表明,本协议可以保证网络在线支付交易的安全性、原子性、可确认性和公平性。
Analysis shows that this protocol guarantees the security, atomicity, accountability and impartiality of network online payment.
类BA N逻辑是一种用于分析密码协议安全性的逻辑。
BAN family of logic is used to analyze the security of cryptographic protocols.
通过BAN逻辑分析,证明了改进协议的安全性。
By BAN logic analysis, the security of this new protocol is proved.
分析结果表明,该协议具有安全性、匿名性、可信性和抗攻击性。
The analysis shows that this protocol is safe, anonymous, trusted, attack-resistant, etc.
实例证明了扩展后的模型和方法能够更精确地分析和描述电子商务安全协议的安全性,并能够应用于更广泛的领域。
It has been proven by instances that the extended model and method can better analyze and describe the security of e-commerce security protocol, and be applied in wider fields.
相应的安全性分析明确给出了考虑这三种攻击时,改进的认证协议比以前的协议更加强健。
The security analyses show that the improved authentication protocol is much stronger against these three kinds of attacks than the traditional protocol.
分析了协议的安全性和性能。
本文提出面向消息中间件的分布式认证协议,给出协议内容、形式化描述以及安全性分析。
This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.
经安全性分析证明,该协议可以在可信计算环境下保证密钥交换的机密性与可靠性,同时还可以保证主机完整性与主机匿名性。
The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.
提出了一种新的安全协商机制用于在SIP实体之间进行安全协议的选择,并给出了相应的安全性分析。
A new negotiation mechanism for the selection of security protocols among SIP entities was put forward, and moreover the corresponding security analysis was provided.
文中详细分析和讨论了协议的性能,包括安全性、不可否认性以及协议的运行效率。
Moreover, the performances of the proposed protocol, including the security, the non-repudiation and the running efficiency, are analyzed and discussed in detail.
并采用BAN认证逻辑对协议的安全性进行了形式化证明,也对协议的计算复杂性进行了定性分析。
Then the formalized security proof of the protocol using BAN authentication logic, and the qualitative analysis about its computing complexity are given.
主要在安全性方面对这两个协议进行了比较与分析。
These two protocols are compared and analyzed mainly in security.
提出了一种新颖的形式化方法,可以用于分析电子商务协议的安全性质,例如可追究性和公平性。
A formal method which can be used to analyze security properties such as accountability and fairness in electronic commerce protocols is presented.
首先对两个基于验证元的三方口令密钥交换协议进行了安全性分析,指出它们都是不安全的。
This paper first presents the security analysis of two verifier-based password-authenticated key exchange protocols for three-party and points out that they are both insecure.
文章简述了SSLv3.0的分层结构、协议状态、握手协议和加密参数计算,并对其安全性做出分析。
This article briefly states the layer structure, the states, handshake protocol and cryptographic calculation of SSL V3.0, and analyses its security.
还分析了本协议的安全性,保证了协议的公平。
The security of the protocol is analyzed and the fairness of it is guaranteed.
与此相应的就是人们对协议的安全性更加关注,尤其是在特殊环境下如何建模和分析安全协议显得尤为重要。
People pay more attention on the security of protocols, especially in how to model and analyze security protocols in special environment.
文章设计了一个新的椭圆曲线密钥交换协议,分析了其安全性,证明了在ECDDHP难解的前提下,该协议是安全的AK协议。
We propose a new elliptic curve key-exchange protocol, analyze its security and prove that assuming ECDDHP is hard to solve, it is a secure AK protocol.
首先论述了安全性的概念,分析了WAP安全的实现模型;重点讨论了WAP安全协议层WTLS的原理;
The paper describes the conception of security and analyses the implementation of the security for WAP with emphasis on the principle of security layer of WAP protocols (WTLS).
本文详细描述了系统的各个协议,并给出了相应的安全性证明和效率分析。
The details of each protocol in our new E-cash system are described thoroughly. In addition, the security proofs and efficiency analysis...
本文详细描述了系统的各个协议,并给出了相应的安全性证明和效率分析。
The details of each protocol in our new E-cash system are described thoroughly. In addition, the security proofs and efficiency analysis are given in...
详细分析了UMTS认证和密钥分配协议的过程以及协议的安全性,找出协议中存在的弱点和可能的攻击,提出了公钥加密协议的改进方法。
This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.
采用BAN逻辑对该协议进行形式化分析表明:协议达到了认证和密钥分配的目标,具有较强的安全性。
Used BAN logic, the objective and the security of this protocol are proved by formal analysis process.
其次,对UAP协议进行安全分析,由于其确认密钥完全依赖于服务器的长期私钥,因此它不具有前向保密性和密钥泄漏的安全性。
Secondly, the UAP protocol is analysed, because the key confirmation completely lies on the long-term private key, so it does not achieve forward secrecy, and resists key-compromise impersonation.
本文研究了认证领域的相关问题,对常见认证协议的原理及其安全性进行了深入分析。
This thesis mainly concerns about certification related issues, giving some introduction and analyzation on several well known certification protocols.
分析了网络互连协议TCP/IP协议中存在的安全问题,以及由此产生的网络不安全性。
This paper analyzes the security problems of the TCP/IP suite and the insecurity of Internet.
一些研究人员在密码协议分析中引入形式化方法,通过建立形式模型和自动检测工具分析密码协议的安全性,取得了较大的成功。
Some researchers introduced formal methods for analyzing cryptographic protocols, and achieved many significant results by building formal models and automatic verifying tools.
一些研究人员在密码协议分析中引入形式化方法,通过建立形式模型和自动检测工具分析密码协议的安全性,取得了较大的成功。
Some researchers introduced formal methods for analyzing cryptographic protocols, and achieved many significant results by building formal models and automatic verifying tools.
应用推荐