串空间模型是安全协议分析的一种重要工具,它具有良好的语义,但其分析过程难度较大。
The strand space model is a very important tool of analyzing security protocol, and it has good semantics, but it is difficult to analyze security protocol.
使用TLS肯定比你自己发明解决方案要好,另外,使用经得起仔细的安全分析的协议,你能从中获益。
It's certainly better to use TLS than inventing your own solution. Additionally, you'll benefit from a protocol that has withstood careful security analysis.
分析人士认为,任何正式协议都必须赢得津巴布韦安全机构的支持。人们普遍认为,津巴布韦安全机构是穆加贝依靠的力量。
Analysts say that any formal agreements will have to win the support of the security establishment in Zimbabwe, which is widely believed to be the power behind Mr. Mugabe.
安全协议的设计和分析是复杂而且容易出错的。
The analysis and design of Security Protocol is always complex and error prone.
分析表明,该协议是安全的,并且协商效率优于现有协议。
Analysis results show that it is a secure protocol and more efficient than other protocols.
因此,分析、设计安全有效的安全协议是计算机通讯领域中一个极为重要的研究课题。
So the analysis and design for efficient security protocol is more important research problem in the field of computer communication.
因此密码协议设计和密码协议分析是信息安全领域的难题。
So the design and analysis of cryptographic protocols are the troubles of information security.
在分析数字图像中数字水印所受各种攻击的基础上,给出了一个基于数字水印技术的数字图像版权保护安全协议框架。
On base of analysis of watermarking attacks on digital images, the paper presents a digital image copyright protection protocol based on digital watermarking technology.
从理论上分析该协议是安全的。
文章对现在流行的安全电子交易SET标准进行分析,指出SET协议存在不满足数字商品交易的原子性以及确认发送原子性等缺陷。
The popular protocol of the Secure Electronic Transaction(SET)discussed by this paper has the flaws of the goods atomic transactions and certified delivery atomic in transacting digital goods.
提出了一种新颖的形式化方法,可以用于分析电子商务协议的安全性质,例如可追究性和公平性。
A formal method which can be used to analyze security properties such as accountability and fairness in electronic commerce protocols is presented.
串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
Strand Space Model (SSM) is a practical, intuitive and strict formal method for security protocol analysis.
串空间模型吸收了前人的研究成果,是分析安全协议的一种实用、直观和严格的形式化方法。
Having fully absorbed the former researching results, strand space model become a practical, intuitive and strict method for security protocols analysis.
理论分析表明这种密钥分配协议是安全可靠的。
Theory analysis shows that this kind of key code distribution's protocol is absolutely safe.
采用形式化方法分析安全协议是协议分析的有效手段,近年来,出现了众多的研究方法。
Using formal method to analyze security protocol is a valid method to the analysis of security protocols. In recent years, a lot of formal methods appeared.
事实证明,串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.
在此基础上,提出了校园网安全方案,重点介绍了网络访问控制、端点安全保护、协议分析和网络安全监控等相关技术。
On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.
最后,对该协议进行了简要的安全分析,证明它能够满足这些安全要求。
Finally, we give a simple security analysis of the protocol to show that it fulfils these requirements.
通过BAN逻辑及各种可能的攻击分析,证明协议是安全的。
On the analysis of BAN-logic and some possible attacks, the protocol is secure.
从一个实用系统出发,采用形式化的证明方法,分析了电子资金转帐系统中安全协议的保密性和可鉴别性。
From an application system, this paper analyzes the privacy and authenticity of a security protocol in the electronic fund transfer system with a formal proof method.
文章在分析ARP协议工作原理、安全缺陷、攻击原理和攻击方式的基础上,详细论述了基于ARP协议攻击的防御方法。
This paper gives a general analysis of the working principle of the ARP, the security vulnerabilities of the ARP, the way of the attack and the protecting method.
分析了协议的安全性和性能。
本文提出面向消息中间件的分布式认证协议,给出协议内容、形式化描述以及安全性分析。
This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.
文中详细分析和讨论了协议的性能,包括安全性、不可否认性以及协议的运行效率。
Moreover, the performances of the proposed protocol, including the security, the non-repudiation and the running efficiency, are analyzed and discussed in detail.
分析SET协议,描述了SET协议中安全数据传输的整个过程。
It analyses the SET protocol, describes the whole procedure of secure data transmission.
主要在安全性方面对这两个协议进行了比较与分析。
These two protocols are compared and analyzed mainly in security.
它具有实时数据流量分析和日志ip网络数据包的能力,能够进行协议分析,是网络安全领域的一个新兴的热点。
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.
该逻辑不但可以用来分析安全协议,而且可以用来设计安全协议。
The logic can be used not only to analyze security protocols, but also to design security protocols.
与此相应的就是人们对协议的安全性更加关注,尤其是在特殊环境下如何建模和分析安全协议显得尤为重要。
People pay more attention on the security of protocols, especially in how to model and analyze security protocols in special environment.
然后,我们深入分析SSL安全协议,全面地介绍了SSL安全协议的工作原理、协议框架以及与TCP/IP的关系。
Then the SSL protocol is analyzed thoroughly, and the principles, protocol architecture and relation between it and TCP/IP protocol set are introduced comprehensively.
应用推荐