• Identity authentication is an important component of the key exchange protocol.

    身份认证密钥交换协议重要组成部分

    youdao

  • This paper presents an identity-based authenticated key exchange protocol in the standard model.

    提出一个标准模型下基于身份认证密钥协商协议

    youdao

  • All this paves the way for the selecting the standard of key exchange protocol when we construct network such as VPN.

    构建VPN网络应用场合,指明密钥交换协议选取依据

    youdao

  • The three-party key distribution task (or, protocol) can be used as an important module for constructing key exchange protocols.

    密钥分配密码任务可以作为密钥交换协议中的一个重要子模块

    youdao

  • After this, the paper takes out a new host Indentity based One-time Key Exchange Protocol (I-OKEP), and analyzes its security character.

    提出一种新的基于主机身份的一次性密钥交换协议i- OKEP分析了安全性

    youdao

  • Compared with protocols under the CRS model, the group key exchange protocol can greatly reduce the risk of putting all trusts in one place.

    和采用CRS模型协议相比降低整个信任集中处带来风险

    youdao

  • Aiming at the demand of contactless smart card, this paper proposes a new mutual authentication key exchange protocol based on low power computing devices.

    针对接触式智能卡需求提出基于有限计算能力的相互认证密钥交换协议

    youdao

  • The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.

    基于验证元口令认证密钥交换协议基本安全目标抵抗字典攻击服务器泄露攻击。

    youdao

  • Aiming at the characteristics of space networks and their special requirements for key exchange, this paper proposes a key exchange protocol for space networks.

    针对空间网络特点空间网络密钥交换特殊需求提出一种适用于空间网络的密钥交换协议

    youdao

  • Through the key exchange protocol, the entities can establish the high-entropy session key and this session will be used in the subsequent secure communication.

    密钥协商协议实体实现安全通信的前提,通过密钥协商协议,实体可以建立高熵会话密钥,这个会话密钥用于随后的通信中。

    youdao

  • In this paper, we first extend the ideal theory of Strand Spaces, and then apply this extended theory to analyzing a complex Internet key exchange protocol, LKE2.

    本文首先扩展空间理想理论然后应用扩展理论分析IKE2协议核心安全:秘密性和认证性。

    youdao

  • EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.

    EKE协议基于口令密钥交换协议通过使用对称密钥加密体制公钥加密体制,能够很好地抵抗离线字典攻击

    youdao

  • Then it discusses the function of identity protection, and how to implement the identity protection in key exchange protocol, which protects the participants identity.

    讨论身份保护作用以及密钥交换协议如何实现身份保护,来保护参与者身份。

    youdao

  • This paper mainly focuses on key exchange protocol based on dynamic password authentication, which can insure the security of both authentication and transportation of VPN system.

    本文主要研究基于动态口令认证密钥交换协议协议保证VPN的认证安全,又能保证VPN的传输安全。

    youdao

  • This article introduces IKE protocol at first, then makes formal analysis on a certain key exchange mode by logical method, and proves the correctness of IKE.

    该文首先介绍ike议,然后协议中一种具体密钥交换模式的安全性使用逻辑方法进行证明得出关于协议正确性的结论。

    youdao

  • A black box testing method aiming at IKE (Internet Key Exchange) protocol performance was proposed, which was based on the self-developed platform of protocol integrated test system.

    提出一种针对密钥交换(IKE)协议性能测试方法方法基于自主开发的协议集成测试系统平台

    youdao

  • We propose a new elliptic curve key-exchange protocol, analyze its security and prove that assuming ECDDHP is hard to solve, it is a secure AK protocol.

    文章设计了一个新的椭圆曲线密钥交换协议分析了安全性证明了在ECDDHP前提下,协议安全AK协议。

    youdao

  • The RDP protocol USES the RC4 symmetric encryption algorithm with up to 128 bit keys. The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.

    RDP协议使用对称加密算法rc4多达128钥匙。rc4加密产生的一个初步交流其中关键使用RSA的非对称加密。

    youdao

  • SRP (the secure remote password protocol) is a new secure password authentication and key-exchange protocol.

    (安全远程密码协议)种安全的新型密码鉴别密钥交换协议。

    youdao

  • The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.

    安全性分析证明协议可以可信计算环境保证密钥交换机密性可靠性,同时还可以保证主机完整性与主机匿名性

    youdao

  • The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.

    安全性分析证明协议可以可信计算环境保证密钥交换机密性可靠性,同时还可以保证主机完整性与主机匿名性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定