以前,安全默认行为是由CSI/V2 默认值(允许协议协商)管理的,这意味着非 SSL客户端能成功请求SSL保护的资源。
Previously, the behavior had been governed by the CSI/V2 default which permitted protocol negotiation, which meant that a non-SSL client could successfully request an otherwise SSL protected resource.
该交易协议设计原则包括安全性、匿名性、非否认性、原子性、公平性与效率。
The design principle of exchange protocol includes security, anonymity, non-repudiation, atomicity , fairness and efficiency.
由于集中监测系统为非安全系统,从系统边界防护角度考虑,应该对集中监测系统和其它系统之间的通信接口采用安全通信协议。
As the centralized monitoring system is a non secure system, it is necessary to adopt a secure communication protocol between the centralized monitoring system and other systems.
协议的安全性是建立在目前尚未存在有效攻击方法的有限域上非超奇异椭圆曲线的椭圆曲线离散对数问题之上的。
The safety of this protocol is based on the elliptic curve discrete logarithm of non-supersingular elliptic curve over finite field, on which there has been no efficient attack method up to now.
该文提出一种论证安全协议之安全性质的非单调动态逻辑。
In this paper, a non monotonic dynamic logic that verifies properties of security protocols is introduced.
针对电子商务安全协议的非否认性,在现有非否认服务的基础上,介绍了一种新型非否认协议。
Based on the non repudiation and the security protocol of non repudiation for electronic commerce, this paper introduces a new non repudiation protocol.
给出了面向非连接通信协议IP层的密码同步的解决方案和安全协议的运行状态图。
Set forth a cipher synchronization scheme in the connectionless oriented IP layer, also present the state transform map of this secure protocol.
电子交易协议的设计有安全性、匿名性、非否认性、原子性、公平性与效率等原则,这些原则在协议设计时具有指导作用。
There are many directive principles in the electronic transaction protocol designing such as security, anonymity, non-repudiation, atomicity, fairness and efficiency.
安全协议特别是认证协议的非形式化分析在复杂的现代通信中变得尤其重要。
Informal methods for the analysis of cryptographic protocols especially authentication protocols are becoming more important in complicated modern communications.
本文提出一种对安全协议进行分析的非单调逻辑。
This paper proposes a non-monotonic logic which can be used to analyze the properties of security protocols.
WTLS握手协议不满足前向安全性,非匿名验证模式下不满足用户匿名性,完全匿名模式下易遭受中间人攻击。
WTLS handshake protocol doesn't provide forward security, and lacks of user anonymity when not in the anonymous mode. It is vulnerable to man-in-the-middle attacks in completely anonymous mode.
验证过程也表明,扩展后的CS逻辑能够有效地描述和分析具有时限性的非否认协议的安全性质。
The example shows the non-reputation protocols with timeliness can be effectively analyzed by the extended CS logic.
验证过程也表明,扩展后的CS逻辑能够有效地描述和分析具有时限性的非否认协议的安全性质。
The example shows the non-reputation protocols with timeliness can be effectively analyzed by the extended CS logic.
应用推荐