• We present a model of computation for cryptographic protocols.

    我们介绍一个密码协议计算模型

    youdao

  • BAN family of logic is used to analyze the security of cryptographic protocols.

    BA N逻辑一种用于分析密码协议安全性逻辑。

    youdao

  • The design and analysis of cryptographic protocols are notoriously complex and error prone.

    因此密码协议设计密码协议分析信息安全领域难题。

    youdao

  • It is well known that designing correct and secure cryptographic protocols is an error-prone task.

    众所周知设计正确安全密码协议一项容易出错任务

    youdao

  • Distributed multiplication computation protocols are widely used as basic cryptographic protocols.

    分布式乘法计算协议应用很广泛基础密码协议。

    youdao

  • In this dissertation we present a general, extensible methodology that examines cryptographic protocols.

    本论文中我们提出了一种通用的,可扩展分析和检查加密协议方法

    youdao

  • Strand space theory is a method for stating and proving correctness properties for cryptographic protocols.

    空间理论一种新兴的用于密码协议形式化分析方法

    youdao

  • The third part is to apply generalized constructing attack method to guide design of cryptographic protocols.

    第三部分应用推广构造攻击方法指导密码协议设计

    youdao

  • The algorithm is useful to speed up the operation for some cryptographic protocols based on multiple exponentiation.

    算法基于多重取幂密码协议快速运作很有效

    youdao

  • The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.

    密码协议分析设计基础进行形式化建模

    youdao

  • This paper mainly does some research in applications of constructing new cryptographic protocols with bilinear pairings.

    本文主要研究线性配对函数构造新的密码协议方面应用

    youdao

  • However, design of cryptographic protocols is a very micromesh job, because any tiny mistake may damage security of the protocol.

    遗憾加密协议设计非常细致工作任何细小错误都可能会影响到协议的安全功能。

    youdao

  • Results show that the method using symbol model checker can discover replay attacks upon some cryptographic protocols and is effective.

    结果表明利用符号模型检测方法分析发现密码协议重放攻击的漏洞种行之有效的方法

    youdao

  • These works indicate that the ATL logic based on game is more suitable to describe and analyze cryptographic protocols than traditional CTL.

    工作表明基于博弈ATL逻辑传统的CTL适合描述分析密码协议

    youdao

  • This result shows that an identity-based signature scheme can be used as a primitive block to design more complicated cryptographic protocols.

    结果表明基于身份的数字签名方案可以作为安全的密码语用于构建复杂的密码协议。

    youdao

  • It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.

    利用形式化分析密码协议方法检测密码协议潜在的安全漏洞,已成为密码学一个新的研究方向

    youdao

  • The thesis also objectively evaluates the performance of time delay, structure properties and software complexity of the above three cryptographic protocols.

    本文对这三种密码协议执行时间结构特性以及实现分析软件复杂度给出了客观的评估。

    youdao

  • Using temporal logic and algebra, a formal requirement language was presented and used to describe the formal hierarchy requirements for cryptographic protocols.

    采用近世代数时序逻辑方法定义了形式化描述语言形式化描述密码协议分层安全需求

    youdao

  • Informal methods for the analysis of cryptographic protocols especially authentication protocols are becoming more important in complicated modern communications.

    安全协议特别是认证协议非形式化分析复杂现代通信中变得尤其重要

    youdao

  • Some researchers introduced formal methods for analyzing cryptographic protocols, and achieved many significant results by building formal models and automatic verifying tools.

    一些研究人员密码协议分析引入形式化方法通过建立形式模型自动检测工具分析密码协议的安全性,取得较大的成功。

    youdao

  • This paper introduces three basic Quantum Cryptographic Protocols. There are BB84 Protocol, HBB Protocol and BF Protocol. And also discusses study of Quantum Authentication Protocols.

    该文主要介绍三个基本量子密码协议,即BB 84协议HBB协议BF协议,分析了量子身份认证协议研究现状。

    youdao

  • Based on the model checking theory, we derive the running mode analysis method of three party cryptographic protocols from the running mode analysis method of two party cryptographic protocols.

    密码协议运行模式分析法基础,利用模型检测理论结果,提出了三方密码协议运行模式分析法。

    youdao

  • Trust is also established from a technology perspective using cryptographic methods, including encryption keys, private or public keys, digital signatures, or protocols.

    技术角度来看,可以使用各种加密方法建立信任包括加密密钥私钥公钥数字签名或者协议

    youdao

  • Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.

    维护机密性完整性典型解决方案涉及使用现有安全协议加密算法。

    youdao

  • Blind signature schemes, an important cryptographic primitive, are useful in protocols that guarantee the anonymity of the participants.

    签名体制保证参与者匿名性基本的、重要密码协议

    youdao

  • It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.

    密码技术主要包括对称密码算法对称密码算法协议

    youdao

  • Information security mainly consists of security protocols and cryptographic algorithm. Cryptographic algorithm is the basis and key technology of the information security.

    信息安全主要安全协议密码算法两方面组成,其中密码算法是信息安全基础核心技术

    youdao

  • Information security mainly consists of security protocols and cryptographic algorithm. Cryptographic algorithm is the basis and key technology of the information security.

    信息安全主要安全协议密码算法两方面组成,其中密码算法是信息安全基础核心技术

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定