In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.
事实证明,串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
Strand Space Model (SSM) is a practical, intuitive and strict formal method for security protocol analysis.
串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
It's certainly better to use TLS than inventing your own solution. Additionally, you'll benefit from a protocol that has withstood careful security analysis.
使用TLS肯定比你自己发明解决方案要好,另外,使用经得起仔细的安全分析的协议,你能从中获益。
So the analysis and design for efficient security protocol is more important research problem in the field of computer communication.
因此,分析、设计安全有效的安全协议是计算机通讯领域中一个极为重要的研究课题。
Finally, we give a simple security analysis of the protocol to show that it fulfils these requirements.
最后,对该协议进行了简要的安全分析,证明它能够满足这些安全要求。
Analysis shows that this protocol guarantees the security, atomicity, accountability and impartiality of network online payment.
分析表明,本协议可以保证网络在线支付交易的安全性、原子性、可确认性和公平性。
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.
它具有实时数据流量分析和日志ip网络数据包的能力,能够进行协议分析,是网络安全领域的一个新兴的热点。
This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.
本文提出面向消息中间件的分布式认证协议,给出协议内容、形式化描述以及安全性分析。
Then the formalized security proof of the protocol using BAN authentication logic, and the qualitative analysis about its computing complexity are given.
并采用BAN认证逻辑对协议的安全性进行了形式化证明,也对协议的计算复杂性进行了定性分析。
On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.
在此基础上,提出了校园网安全方案,重点介绍了网络访问控制、端点安全保护、协议分析和网络安全监控等相关技术。
Considering the data flow description in protocol security testing, mutation analysis is introduced based on constructed type algebra, and a new protocol security testing method is proposed.
针对协议安全测试中数据流的描述问题,在构造类别代数的基础上引入变异分析,由此提出了一种协议安全测试方法。
Security analysis results show that compared with L-L-C-Z threshold proxy signcryption protocol, the improved threshold proxy signcryption protocol can withstand the public key substitution attack.
安全分析结果表明,与L - L - C - Z门限代理签密协议相比,该改进门限代理签密协议能够承受接收方公钥替换攻击。
In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.
本文分析了IMS认证与密钥分配协议的过程,找出了认证协议中的安全缺陷,并给出了攻击者可能进行的攻击。
Using formal method to analyze security protocol is a valid method to the analysis of security protocols. In recent years, a lot of formal methods appeared.
采用形式化方法分析安全协议是协议分析的有效手段,近年来,出现了众多的研究方法。
Used BAN logic, the objective and the security of this protocol are proved by formal analysis process.
采用BAN逻辑对该协议进行形式化分析表明:协议达到了认证和密钥分配的目标,具有较强的安全性。
Security protocol is a very important role in securing network communication, and the formal analysis method for security protocol becomes one of the hottest research topics in security field.
保障网络通信安全的一个极其重要的环节是安全协议,安全协议的形式化分析方法已成为近年来安全领域研究的热点之一。
The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.
经安全性分析证明,该协议可以在可信计算环境下保证密钥交换的机密性与可靠性,同时还可以保证主机完整性与主机匿名性。
The results of security analysis and efficiency analysis show that the new protocol realizes the secure communications under the low computational cost.
安全性分析和性能分析显示,新协议以较低的代价实现了通信双方的安全通信。
The details of each protocol in our new E-cash system are described thoroughly. In addition, the security proofs and efficiency analysis...
本文详细描述了系统的各个协议,并给出了相应的安全性证明和效率分析。
The details of each protocol in our new E-cash system are described thoroughly. In addition, the security proofs and efficiency analysis are given in...
本文详细描述了系统的各个协议,并给出了相应的安全性证明和效率分析。
After setting up the idealized protocol model, a process of formal analysis of this protocol is presented and the security is proved theoretically by using the BAN logic.
通过建立协议的理想化模型,利用BAN逻辑形式化分析该协议,在理论上证明其安全性。
Formal methods for protocol analysis ware put forward based on changing the security problem into a mathematical problem, which we can rigorously prove it instead of judging by intuition.
安全协议形式化分析技术的提出,将协议的安全性问题转化为数学问题,采用数学证明的手段来代替直觉的判定,近年来已逐步被公认为解决安全问题的合理方案。
This paper proposes a new simple trace semantics that can be used to specify security properties, this technique supports a protocol designer to provide formal analysis of the security properties.
本文提出了一种新的简单的迹语义,用于刻画协议部分安全性质,即只针对协议规约的单个主体,此技术支持协议设计者对安全性质进行形式化规约。
The security analysis shows that the protocol has desirable features of anonymity…
分析显示协议能极好地抵御各种攻击。
The security analysis shows that the protocol has desirable features of anonymity…
分析显示协议能极好地抵御各种攻击。
应用推荐