We present a model of computation for cryptographic protocols.
我们介绍了一个密码协议的计算模型。
A very important factor of network security is cryptographic protocols.
网络安全中一个非常重要的因素就是密码协议。
BAN family of logic is used to analyze the security of cryptographic protocols.
类BA N逻辑是一种用于分析密码协议安全性的逻辑。
The design and analysis of cryptographic protocols are notoriously complex and error prone.
因此密码协议设计和密码协议分析是信息安全领域的难题。
So the design and analysis of cryptographic protocols are the troubles of information security.
因此密码协议设计和密码协议分析是信息安全领域的难题。
It is well known that designing correct and secure cryptographic protocols is an error-prone task.
众所周知,设计正确而安全的密码协议是一项容易出错的任务。
Distributed multiplication computation protocols are widely used as basic cryptographic protocols.
分布式乘法计算协议是应用很广泛的基础密码协议。
In this dissertation we present a general, extensible methodology that examines cryptographic protocols.
在本论文中我们提出了一种通用的,可扩展的分析和检查加密协议的方法。
Strand space theory is a method for stating and proving correctness properties for cryptographic protocols.
串空间理论是一种新兴的用于密码协议形式化分析的方法。
The third part is to apply generalized constructing attack method to guide design of cryptographic protocols.
第三部分,应用推广的构造攻击方法指导密码协议的设计。
The algorithm is useful to speed up the operation for some cryptographic protocols based on multiple exponentiation.
此算法对基于多重取幂密码协议的快速运作是很有效用的。
The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.
密码协议分析与设计的基础是对其进行形式化建模。
This paper mainly does some research in applications of constructing new cryptographic protocols with bilinear pairings.
本文主要研究双线性配对函数在构造新的密码协议方面的应用。
However, design of cryptographic protocols is a very micromesh job, because any tiny mistake may damage security of the protocol.
遗憾的是,加密协议的设计是一项非常细致的工作,任何细小的错误都可能会影响到协议的安全功能。
Results show that the method using symbol model checker can discover replay attacks upon some cryptographic protocols and is effective.
结果表明,利用符号模型检测方法分析并发现密码协议重放攻击的漏洞是一种行之有效的方法。
These works indicate that the ATL logic based on game is more suitable to describe and analyze cryptographic protocols than traditional CTL.
工作表明基于博弈的ATL逻辑比传统的CTL更适合于描述和分析密码协议。
This result shows that an identity-based signature scheme can be used as a primitive block to design more complicated cryptographic protocols.
这一结果表明基于身份的数字签名方案可以作为安全的密码原语用于构建更复杂的密码协议。
It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.
利用形式化分析密码协议的方法来检测密码协议中潜在的安全漏洞,已成为密码学中一个新的研究方向。
The thesis also objectively evaluates the performance of time delay, structure properties and software complexity of the above three cryptographic protocols.
本文对这三种密码协议的执行时间、结构特性以及实现分析的软件复杂度给出了客观的评估。
Using temporal logic and algebra, a formal requirement language was presented and used to describe the formal hierarchy requirements for cryptographic protocols.
采用近世代数和时序逻辑的方法定义了形式化描述语言,并形式化地描述了密码协议的分层安全需求。
Informal methods for the analysis of cryptographic protocols especially authentication protocols are becoming more important in complicated modern communications.
安全协议特别是认证协议的非形式化分析在复杂的现代通信中变得尤其重要。
Some researchers introduced formal methods for analyzing cryptographic protocols, and achieved many significant results by building formal models and automatic verifying tools.
一些研究人员在密码协议分析中引入形式化方法,通过建立形式模型和自动检测工具分析密码协议的安全性,取得了较大的成功。
This paper introduces three basic Quantum Cryptographic Protocols. There are BB84 Protocol, HBB Protocol and BF Protocol. And also discusses study of Quantum Authentication Protocols.
该文主要介绍三个基本的量子密码协议,即BB 84协议、HBB协议和BF协议,分析了量子身份认证协议的研究现状。
Based on the model checking theory, we derive the running mode analysis method of three party cryptographic protocols from the running mode analysis method of two party cryptographic protocols.
在两方密码协议运行模式分析法的基础上,利用模型检测的理论结果,提出了三方密码协议运行模式分析法。
Trust is also established from a technology perspective using cryptographic methods, including encryption keys, private or public keys, digital signatures, or protocols.
从技术的角度来看,还可以使用各种加密方法来建立信任,包括加密密钥、私钥或公钥、数字签名,或者协议。
Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.
维护机密性和完整性的典型解决方案涉及使用现有的安全协议和加密算法。
Blind signature schemes, an important cryptographic primitive, are useful in protocols that guarantee the anonymity of the participants.
盲签名体制是保证参与者匿名性的基本的、重要的密码协议。
It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.
密码技术主要包括对称密码算法和非对称密码算法及协议。
Information security mainly consists of security protocols and cryptographic algorithm. Cryptographic algorithm is the basis and key technology of the information security.
信息安全主要是由安全协议和密码算法两方面组成,其中密码算法是信息安全的基础和核心技术。
Information security mainly consists of security protocols and cryptographic algorithm. Cryptographic algorithm is the basis and key technology of the information security.
信息安全主要是由安全协议和密码算法两方面组成,其中密码算法是信息安全的基础和核心技术。
应用推荐