串空间模型是安全协议分析的一种重要工具,它具有良好的语义,但其分析过程难度较大。
The strand space model is a very important tool of analyzing security protocol, and it has good semantics, but it is difficult to analyze security protocol.
使用TLS肯定比你自己发明解决方案要好,另外,使用经得起仔细的安全分析的协议,你能从中获益。
It's certainly better to use TLS than inventing your own solution. Additionally, you'll benefit from a protocol that has withstood careful security analysis.
分析人士认为,任何正式协议都必须赢得津巴布韦安全机构的支持。人们普遍认为,津巴布韦安全机构是穆加贝依靠的力量。
Analysts say that any formal agreements will have to win the support of the security establishment in Zimbabwe, which is widely believed to be the power behind Mr. Mugabe.
因此,分析、设计安全有效的安全协议是计算机通讯领域中一个极为重要的研究课题。
So the analysis and design for efficient security protocol is more important research problem in the field of computer communication.
在分析数字图像中数字水印所受各种攻击的基础上,给出了一个基于数字水印技术的数字图像版权保护安全协议框架。
On base of analysis of watermarking attacks on digital images, the paper presents a digital image copyright protection protocol based on digital watermarking technology.
文章对现在流行的安全电子交易SET标准进行分析,指出SET协议存在不满足数字商品交易的原子性以及确认发送原子性等缺陷。
The popular protocol of the Secure Electronic Transaction(SET)discussed by this paper has the flaws of the goods atomic transactions and certified delivery atomic in transacting digital goods.
提出了一种新颖的形式化方法,可以用于分析电子商务协议的安全性质,例如可追究性和公平性。
A formal method which can be used to analyze security properties such as accountability and fairness in electronic commerce protocols is presented.
串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
Strand Space Model (SSM) is a practical, intuitive and strict formal method for security protocol analysis.
串空间模型吸收了前人的研究成果,是分析安全协议的一种实用、直观和严格的形式化方法。
Having fully absorbed the former researching results, strand space model become a practical, intuitive and strict method for security protocols analysis.
本文针对安全协议中的时限责任问题,提出结合责任性与新鲜性来分析时间标记。
To analyze the time-critical secure protocols, we propose a new method that combines temporal accountability and timestamp freshness verification.
分析了采用以太网技术后一些高层协议的应用,并对传输介质和本质安全的问题进行了讨论。
In this paper, some application of high Ethernet protocol is discussed, and the transmission media and essential security is also analysed.
采用形式化方法分析安全协议是协议分析的有效手段,近年来,出现了众多的研究方法。
Using formal method to analyze security protocol is a valid method to the analysis of security protocols. In recent years, a lot of formal methods appeared.
事实证明,串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.
本文用模型检测的方法分析了不可靠环境下电子商务协议的安全性质。
We analyse the security of e-commerce protocols in failure environments using the model checking approach.
在此基础上,提出了校园网安全方案,重点介绍了网络访问控制、端点安全保护、协议分析和网络安全监控等相关技术。
On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.
最后,对该协议进行了简要的安全分析,证明它能够满足这些安全要求。
Finally, we give a simple security analysis of the protocol to show that it fulfils these requirements.
分析了COPS协议(3)提出了一个简单实现安全关联(SA)创建的方法并进行了具体实现。
Analyses the COPS protocol. 3 Suggests a simple way as how to create a security SA automatically.
从一个实用系统出发,采用形式化的证明方法,分析了电子资金转帐系统中安全协议的保密性和可鉴别性。
From an application system, this paper analyzes the privacy and authenticity of a security protocol in the electronic fund transfer system with a formal proof method.
文章在分析ARP协议工作原理、安全缺陷、攻击原理和攻击方式的基础上,详细论述了基于ARP协议攻击的防御方法。
This paper gives a general analysis of the working principle of the ARP, the security vulnerabilities of the ARP, the way of the attack and the protecting method.
相应的安全性分析明确给出了考虑这三种攻击时,改进的认证协议比以前的协议更加强健。
The security analyses show that the improved authentication protocol is much stronger against these three kinds of attacks than the traditional protocol.
本文提出面向消息中间件的分布式认证协议,给出协议内容、形式化描述以及安全性分析。
This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.
文中详细分析和讨论了协议的性能,包括安全性、不可否认性以及协议的运行效率。
Moreover, the performances of the proposed protocol, including the security, the non-repudiation and the running efficiency, are analyzed and discussed in detail.
并采用BAN认证逻辑对协议的安全性进行了形式化证明,也对协议的计算复杂性进行了定性分析。
Then the formalized security proof of the protocol using BAN authentication logic, and the qualitative analysis about its computing complexity are given.
主要在安全性方面对这两个协议进行了比较与分析。
These two protocols are compared and analyzed mainly in security.
给出了一种针对传感器网络的安全加密协议,并对该协议的一些实现问题及其特点进行了分析。
A protocol of encryption for security in sensor networks is proposed, and some problems of realization and characteristics for this protocol are analyzed.
分析表明,本协议可以保证网络在线支付交易的安全性、原子性、可确认性和公平性。
Analysis shows that this protocol guarantees the security, atomicity, accountability and impartiality of network online payment.
它具有实时数据流量分析和日志ip网络数据包的能力,能够进行协议分析,是网络安全领域的一个新兴的热点。
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.
该逻辑不但可以用来分析安全协议,而且可以用来设计安全协议。
The logic can be used not only to analyze security protocols, but also to design security protocols.
与此相应的就是人们对协议的安全性更加关注,尤其是在特殊环境下如何建模和分析安全协议显得尤为重要。
People pay more attention on the security of protocols, especially in how to model and analyze security protocols in special environment.
与此相应的就是人们对协议的安全性更加关注,尤其是在特殊环境下如何建模和分析安全协议显得尤为重要。
People pay more attention on the security of protocols, especially in how to model and analyze security protocols in special environment.
应用推荐