• In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.

    事实证明,空间模型分析安全协议一种实用直观严格形式化方法

    youdao

  • Strand Space Model (SSM) is a practical, intuitive and strict formal method for security protocol analysis.

    空间模型分析安全协议一种实用直观严格形式化方法

    youdao

  • It's certainly better to use TLS than inventing your own solution. Additionally, you'll benefit from a protocol that has withstood careful security analysis.

    使用TLS肯定自己发明解决方案要好另外,使用经得起仔细安全分析的协议从中获益

    youdao

  • The analysis and design of Security Protocol is always complex and error prone.

    安全协议设计分析复杂而且容易出错的。

    youdao

  • So the analysis and design for efficient security protocol is more important research problem in the field of computer communication.

    因此分析设计安全有效安全协议计算机通讯领域一个极为重要的研究课题。

    youdao

  • Finally, we give a simple security analysis of the protocol to show that it fulfils these requirements.

    最后协议进行了简要安全分析证明能够满足这些安全要求。

    youdao

  • Analysis shows that this protocol guarantees the security, atomicity, accountability and impartiality of network online payment.

    分析表明协议可以保证网络在线支付交易安全性原子性、可确认性公平性

    youdao

  • It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.

    具有实时数据流量分析日志ip网络数据包能力,能够进行协议分析,是网络安全领域一个新兴热点

    youdao

  • This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.

    本文提出面向消息中间件的分布式认证协议给出协议内容形式化描述以及安全性分析。

    youdao

  • Then the formalized security proof of the protocol using BAN authentication logic, and the qualitative analysis about its computing complexity are given.

    采用BAN认证逻辑协议安全性进行形式化证明协议的计算复杂性进行了定性分析

    youdao

  • On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.

    基础上提出校园网安全方案重点介绍了网络访问控制端点安全保护、协议分析网络安全监控相关技术

    youdao

  • By BAN logic analysis, the security of this new protocol is proved.

    通过BAN逻辑分析证明了改进协议安全性

    youdao

  • Considering the data flow description in protocol security testing, mutation analysis is introduced based on constructed type algebra, and a new protocol security testing method is proposed.

    针对协议安全测试数据描述问题,在构造类别代数基础引入变异分析,由此提出了种协议安全测试方法

    youdao

  • Security analysis results show that compared with L-L-C-Z threshold proxy signcryption protocol, the improved threshold proxy signcryption protocol can withstand the public key substitution attack.

    安全分析结果表明,与L - L - C - Z门限代理协议相比改进门限代理签密协议能够承受接收方公钥替换攻击。

    youdao

  • In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.

    本文分析IMS认证密钥分配协议过程,找出认证协议中的安全缺陷,给出了攻击者可能进行的攻击。

    youdao

  • Using formal method to analyze security protocol is a valid method to the analysis of security protocols. In recent years, a lot of formal methods appeared.

    采用形式化方法分析安全协议协议分析有效手段近年来,出现了众多的研究方法

    youdao

  • Used BAN logic, the objective and the security of this protocol are proved by formal analysis process.

    采用BAN逻辑协议进行形式化分析表明:协议达到了认证密钥分配目标,具有较强的安全性

    youdao

  • Security protocol is a very important role in securing network communication, and the formal analysis method for security protocol becomes one of the hottest research topics in security field.

    保障网络通信安全一个极其重要环节安全协议,安全协议形式化分析方法已成为近年来安全领域研究热点之一

    youdao

  • The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.

    安全性分析证明协议可以可信计算环境保证密钥交换机密性可靠性,同时还可以保证主机完整性与主机匿名性

    youdao

  • Recently, analysis and improvement of IKE protocol has become a hotspot in network security area.

    近年来IKE协议分析改进成为网络安全领域的一个研究热点。

    youdao

  • The results of security analysis and efficiency analysis show that the new protocol realizes the secure communications under the low computational cost.

    安全性分析性能分析显示协议以较低的代价实现通信双方的安全通信。

    youdao

  • The details of each protocol in our new E-cash system are described thoroughly. In addition, the security proofs and efficiency analysis...

    本文详细描述了系统各个协议,并给出了相应安全性证明效率分析

    youdao

  • The details of each protocol in our new E-cash system are described thoroughly. In addition, the security proofs and efficiency analysis are given in...

    本文详细描述了系统各个协议,并给出了相应安全性证明效率分析

    youdao

  • After setting up the idealized protocol model, a process of formal analysis of this protocol is presented and the security is proved theoretically by using the BAN logic.

    通过建立协议理想化模型利用BAN逻辑形式化分析协议,在理论上证明安全性

    youdao

  • Formal methods for protocol analysis ware put forward based on changing the security problem into a mathematical problem, which we can rigorously prove it instead of judging by intuition.

    安全协议形式化分析技术提出,将协议安全性问题转化数学问题,采用数学证明的手段来代替直觉的判定,近年来已逐步公认为解决安全问题的合理方案。

    youdao

  • This paper proposes a new simple trace semantics that can be used to specify security properties, this technique supports a protocol designer to provide formal analysis of the security properties.

    本文提出了一种新的简单语义用于刻画协议部分安全性质,即只针对协议规约的单个主体,技术支持协议设计者对安全性质进行形式化规约。

    youdao

  • The security analysis shows that the protocol has desirable features of anonymity

    分析显示协议能极好抵御各种攻击。

    youdao

  • The security analysis shows that the protocol has desirable features of anonymity

    分析显示协议能极好抵御各种攻击。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定