• 以前安全默认行为CSI/V2 默认值(允许协议协商)管理的,意味着 SSL客户端成功请求SSL保护资源

    Previously, the behavior had been governed by the CSI/V2 default which permitted protocol negotiation, which meant that a non-SSL client could successfully request an otherwise SSL protected resource.

    youdao

  • 交易协议设计原则包括安全匿名性否认性原子性公平性效率

    The design principle of exchange protocol includes security, anonymity, non-repudiation, atomicity , fairness and efficiency.

    youdao

  • 由于集中监测系统安全系统,从系统边界防护角度考虑,应该集中监测系统和其它系统之间通信接口采用安全通信协议

    As the centralized monitoring system is a non secure system, it is necessary to adopt a secure communication protocol between the centralized monitoring system and other systems.

    youdao

  • 协议安全建立目前尚未存在有效攻击方法有限超奇异椭圆曲线椭圆曲线离散对数问题之上的。

    The safety of this protocol is based on the elliptic curve discrete logarithm of non-supersingular elliptic curve over finite field, on which there has been no efficient attack method up to now.

    youdao

  • 该文提出一种论证安全协议安全性质单调动态逻辑

    In this paper, a non monotonic dynamic logic that verifies properties of security protocols is introduced.

    youdao

  • 针对电子商务安全协议否认性,现有否认服务基础上,介绍一种新型否认协议

    Based on the non repudiation and the security protocol of non repudiation for electronic commerce, this paper introduces a new non repudiation protocol.

    youdao

  • 给出了面向连接通信协议IP密码同步解决方案安全协议的运行状态

    Set forth a cipher synchronization scheme in the connectionless oriented IP layer, also present the state transform map of this secure protocol.

    youdao

  • 电子交易协议设计安全匿名性、否认性、原子性公平性效率原则,这些原则在协议设计时具有指导作用

    There are many directive principles in the electronic transaction protocol designing such as security, anonymity, non-repudiation, atomicity, fairness and efficiency.

    youdao

  • 安全协议特别是认证协议形式化分析复杂现代通信变得尤其重要

    Informal methods for the analysis of cryptographic protocols especially authentication protocols are becoming more important in complicated modern communications.

    youdao

  • 本文提出一种安全协议进行分析单调逻辑

    This paper proposes a non-monotonic logic which can be used to analyze the properties of security protocols.

    youdao

  • WTLS握手协议满足前向安全匿名验证模式满足用户匿名性,完全匿名模式下遭受中间人攻击

    WTLS handshake protocol doesn't provide forward security, and lacks of user anonymity when not in the anonymous mode. It is vulnerable to man-in-the-middle attacks in completely anonymous mode.

    youdao

  • 验证过程也表明扩展后CS逻辑能够有效地描述和分析具有时限性的否认协议安全性质。

    The example shows the non-reputation protocols with timeliness can be effectively analyzed by the extended CS logic.

    youdao

  • 验证过程也表明扩展后CS逻辑能够有效地描述和分析具有时限性的否认协议安全性质。

    The example shows the non-reputation protocols with timeliness can be effectively analyzed by the extended CS logic.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定