助手标题
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
共[2]页 共[35]条 当前为第1条到20条
 

相关语句
secure protocol
HermitFS uses strong cryptography algorithms and a secure protocol to secure the data from the time it is written to the time an authorized user accesses it.
      
Various optimizations in the Canetti-Krawczyk model for secure protocol design are proven to preserve security.
      
A secure protocol for the oblivious transfer (extended abstract)
      
These results hold both for the case of general composition (where a secure protocol is run many times concurrently with arbitrary other protocols) and self-composition (where a single secure protocol is run many times concurrently).
      
The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed.
      
A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
      
For this problem, a secure protocol is proposed in the semi-honest model based on semantically secure homomorphic encryption scheme, secure sharing scheme, and the polynomial representation of sets.
      
A forward secure protocol should not allow an intruder to know the previous session key after divulging the secret key of the sender or the receiver.
      
A secure protocol for computing dot-products in clustered and distributed environments.
      
A second contribution of our paper is a foundation for secure protocol design.
      
At this point, it becomes necessary to determine exactly what the goals of a secure protocol must be.
      
Further reduction of the information revealed is possible by using a secure protocol for finding the maximum among a set of numbers.
      
However, a problem arises if the secure protocol itself is supposed to remain secure under parallel or concurrent stateless composition.
      
It is clear that if a new and more secure protocol becomes widely adopted, it would be easy to replace the less secure Bluetooth transfer.
      
It would also reduce the utility of the secure protocol, since the easiest way to communicate would likely be by using the transport layer directly.
      
In the secure protocol the possibility of an active intruder causes us to make our packets permanently uniquely identified.
      
In Section 3.2, we present a scalable and secure protocol that computes the kernel matrix in linear time, without disclosing any data.
      
In this paper we will introduce a secure protocol that can be used for any m-commerce transaction.
      
Main research issues include dynamic resource allocation, bandwidth utilization, and secure protocol.
      
Moreover, the secure protocol may itself contains flaws which could be further exploited by an attacker.
      
 

首页上一页12下一页尾页 

 
CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社