In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.
事实证明,串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
Now the most popular web security protocol is SSL, which can be deployed in the embedded browser.
将SSL协议与嵌入式浏览器相结合即可满足安全数据传输的要求。
The security protocol verification is one of the important projects in the domain of network security.
安全协议认证是网络安全领域中重大课题之一。
The security protocol is found to have bugs or leaks if the logic can not reason out the protocol goal.
如果不能推理出协议的最终目标,说明协议存在缺陷或者漏洞。
Strand Space Model (SSM) is a practical, intuitive and strict formal method for security protocol analysis.
串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
There are many ways proposed to analyze the security protocol, the BAN-like logic is one of the important ways.
人们提出了多种密码协议的分析方法,BAN类逻辑是其中重要的一种。
Information security is composed of security protocol and cryptographic algorithm, the latter is the base and core.
信息安全主要是由安全协议和密码算法组成,其中密码算法是信息安全的基础和核心技术。
For example, a security protocol channel can be layered over HTTP transport channel to provide secure communications over HTTP.
如,可以使用将安全协议信道置于HTTP传输信道之上来提供安全的HTTP传输通信。
SSL (Secure Sockets Layer), a widely used security protocol in the net, can provide security guarantee for Internet communications.
SSL作为互联网上普遍使用的一种安全协议,可以为互联网通信提供安全保障。
So the analysis and design for efficient security protocol is more important research problem in the field of computer communication.
因此,分析、设计安全有效的安全协议是计算机通讯领域中一个极为重要的研究课题。
Integration of the new nuclear agreement and SSL encryption security protocol to achieve data transmission 128-168 bit strong encryption.
集成核新加密协议及SSL安全通讯协议,实现数据传输的128- 168位强加密。
The main ideas and methods of security protocol design and the PDS are introduced, and presents the derivation of the ISO-9798-3 protocol.
通过介绍目前安全协议设计的主要思路和方法,说明了PDS系统的主要内容和方法,推导出了ISO- 9798 -3协议。
E-commerce security protocol is not only an important way to protect the security of e-commerce, but also the core technology of thee-commerce.
电子商务安全协议是保障电子商务安全性的重要途径,也是电子商务中最核心最关键的技术。
As a protocol level framework of the security Problem Resolve, security protocol keeps on being the hot and difficult point in the security area.
安全协议作为协议级的安全解决框架,始终是安全领域里的热点和难点。
Thirdly, this thesis sets forth a routing security protocol of the wireless sensor networks, and establishes a special clock synchronous protocol.
第三,本论文设计了轻量散投的无线传感器网络安全路由协议;
Provides a stream that uses the Negotiate security protocol to authenticate the client, and optionally the server, in client-server communication.
提供一个使用协商安全协议的流,以便对客户端/服务器通信中的客户端及服务器(可选)进行身份验证。
Protocol analyser can analyse security protocol by the logic, and protocol designer can construct security protocol by the logic in a systematic way.
协议分析者可以用该逻辑来对安全协议进行分析,而协议设计者可以使用该逻辑用一种系统的方法来构造安全协议。
Based on the non repudiation and the security protocol of non repudiation for electronic commerce, this paper introduces a new non repudiation protocol.
针对电子商务安全协议的非否认性,在现有非否认服务的基础上,介绍了一种新型非否认协议。
PAM's architecture is modular, which means it's designed to support the seamless exchange of one security protocol component for another by swapping out modules.
PAM的体系结构是模块化的,这意味着它设计为可以通过交换模块,支持从一个安全协议组件无缝地转换到另一个协议组件。
The strand space model is a very important tool of analyzing security protocol, and it has good semantics, but it is difficult to analyze security protocol.
串空间模型是安全协议分析的一种重要工具,它具有良好的语义,但其分析过程难度较大。
Using formal method to analyze security protocol is a valid method to the analysis of security protocols. In recent years, a lot of formal methods appeared.
采用形式化方法分析安全协议是协议分析的有效手段,近年来,出现了众多的研究方法。
While the former can be accomplished via use of Kerberos (see Resources) and similar network security protocol, the latter requires special administrative tuning.
尽管前者可以通过使用Kerberos (参见参考资料)和类似的网络安全协议完成,但是后者需要特殊的管理调优。
We abstract this as a group of logic rules, which makes it possible to do the verification of the interleaving of infinite sessions of the security protocol.
将安全协议对应的并发合成系统抽象为一组逻辑规则,能够对安全协议无穷会话的交叠运行进行验证。
From an application system, this paper analyzes the privacy and authenticity of a security protocol in the electronic fund transfer system with a formal proof method.
从一个实用系统出发,采用形式化的证明方法,分析了电子资金转帐系统中安全协议的保密性和可鉴别性。
Then the thesis put forward to a kind of security protocol based on trusted third party and a kind of lightweight IP layer security mechanism, and analysed them in details.
然后提出了一种基于可信第三方的安全协议以及一种轻量级IP层的安全机制,对它们进行了详细的分析。
The importance of e-commerce security protocol is self-evident as a key factor to ensure the information and data security, and to safeguard the vital interests of both sides.
电子商务安全协议作为切实保证交易双方信息数据安全,维护双方切身利益的关键因素,其重要性不言而喻。
Called by servers to begin an asynchronous operation to authenticate the server and optionally the client using the specified certificates, requirements and security protocol.
由服务器调用以开始一个异步操作,该操作使用指定的证书、要求和安全协议对服务器和客户端(可选)进行身份验证。
A guessing attack on a security protocol is an attack where an attacker guesses a chosen user's secret and if failed then seeks to verify that guess by using other information.
对安全协议进行猜测攻击,如果攻击者不能正确猜测用户秘密,那么他就会设法使用其他的信息来验证这种猜测。
It has been proven by instances that the extended model and method can better analyze and describe the security of e-commerce security protocol, and be applied in wider fields.
实例证明了扩展后的模型和方法能够更精确地分析和描述电子商务安全协议的安全性,并能够应用于更广泛的领域。
Especially when we use IP security protocol in the internal host password credentials to sign, on the basis of these marks strategy is undoubtedly more credibility for the host.
特别在当我们使用IP安全协议中的密码凭证来标志内部主机时,基于这些标志的策略对主机来说无疑更具可信性。
应用推荐