助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   钥协议 的翻译结果: 查询用时:0.528秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

钥协议
相关语句
  key protocol
     With SMV, we model check the authentication version of Needham-Schroeder public key protocol and Woo and Lam IJ symmetric key protocol.
     确定了使用SMV作为工具对安全协议进行模型检验,验证了认证版Needham-Schroeder公钥协议和Woo and Lam Π对称钥协议
短句来源
     We use this method to model the well-known Needham-Schroedor Public Key Protocol, execute this model by CPN Tools and found a flow in this protocol.
     利用这一方法对著名的Needham-Schroedor公钥协议建模,然后用CPNTools实现并对协议进行检测,发现了协议存在的漏洞。
短句来源
     (8) present an extension of Cs logic which reflects the properties of timed-release public key protocols better, and give a good formal analysis to a concrete timed-release pubic key protocol;
     (8)提出了能够更好地反映Timed-release公钥协议特性的CS逻辑的扩展逻辑,并对一个具体的协议实例给出了完整有效的形式化分析;
短句来源
     Needham-Schroeder public key protocol is taken as an example to explain the process of protocol analysis.
     并以Needham Schroeder公钥协议为例 ,说明了该方法进行协议分析的过程。
短句来源
     During the modeling and verification of the authentication version of Needham-Schroeder public key protocol with SMV, we get more comprehension on the theory of symbolic model checking and small system model, and finally find a flaw in this protocol that corresponds with the one that Gavin Lowe found with FDR.
     通过使用SMV对Needham-Schroeder公钥协议进行建模和验证,理解了符号化模型检验和小系统模型的原理,并发现了一个协议漏洞,该漏洞与Gavin Lowe用FDR所发现的相一致。
短句来源
更多       
  “钥协议”译为未确定词的双语例句
     Model Checking Analysis of Needham-Schroeder Public-Key Protocol
     Needham-Schroeder公钥协议的模型检测分析
短句来源
     An Extension Logic of Timed-Release Public Key Protocols Analysis
     一种分析Timed-Release公钥协议的扩展逻辑
短句来源
     An automatic generating approach for public key cryptographic protocols is presented. SVO logic is used to describe and verify the protocols.
     提出了一种公钥密码体制安全协议的生成方法,用进化策略来生成公钥协议,并采用SVO逻辑来描述和验证公钥协议
短句来源
     Improvement of Needham-Schroeder Protocol with Shared Keys
     Needham-Schroeder私钥协议的改进
短句来源
     A methodology is presented using a model checke r of formal methods, SMV (symbolic model verifier), to analyze the well known Ne edham-Schroeder Public-Key Protocol.
     提出了运用模型检测工具 SMV( symbolic model verifier)分析密码协议的方法 ,并对著名的 Needham- Schroeder( NS)公钥协议进行了分析 .
短句来源
更多       
  相似匹配句对
     Improvement of Needham-Schroeder Protocol with Shared Keys
     Needham-Schroeder私协议的改进
短句来源
     The analysis and re-design for Needham-Schroeder public key protocols and three-message X.
     同时,以Needham-Schroeder公协议及X.
短句来源
     IP telephony protocol is the core of soft switch.
     SIP协议和H.
短句来源
     2 protocol and bring forward the extend group diffie?
     2协议 ;
短句来源
     F-L Public-Key Cryptosystem
     F-L公密码体制
短句来源
查询“钥协议”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  key protocol
The key protocol point associated with successful staining was an antigen retrieval step involving heat treatment and either EDTA or citrate buffer.
      
We extend the technique to meet the binding requirements and show how the flaw in the Denning and Sacco public key protocol, which was discovered by Abadi and Needham, is revealed.
      
We demonstrate the extended technique using one protocol of our own and the Needham and Schroeder public key protocol.
      
For the asymmetric-key protocol, in both cases, the automatic protocol generation finds the same protocol as the optimal protocol.
      
For example, in the Needham-Schroeder public key protocol, the message the initiator sends in step number 3 is modeled by the rule in Figure 16.
      
更多          


This paper researches on Needham-Schroeder protocol with shared keys.It points out bugs and leaks that the protocol exists,and provids a kind of method to attack the protocol.Needham and Schroeder have revised the primitive protocol,but the amended protocol still has a leak.Some other scholars have revised this protocol too,but the amended protocol still is unsatisfactory.In allusion to bugs and leaks existing to the primitive protocol,the paper carries on corresponding modification,and analyses the amended...

This paper researches on Needham-Schroeder protocol with shared keys.It points out bugs and leaks that the protocol exists,and provids a kind of method to attack the protocol.Needham and Schroeder have revised the primitive protocol,but the amended protocol still has a leak.Some other scholars have revised this protocol too,but the amended protocol still is unsatisfactory.In allusion to bugs and leaks existing to the primitive protocol,the paper carries on corresponding modification,and analyses the amended protocol with BAN logic.It indicates that the amended protocol can reach the goal of the protocol.

研究了Needham-Schroeder私钥协议,指出了该协议存在的缺陷和漏洞,并给出了一种攻击该协议方法。虽然Needham和Schroeder对原始的协议进行了修改,但修改后的协议仍然存在缺陷。还有其他一些学者也对该协议进行了修改,但是仍然不令人满意。针对原始协议存在的缺陷和漏洞,该文进行了相应的修改,并用BAN逻辑来分析了修改后的协议,说明修改后的协议能够达到协议的目标。

>=In this article, we will propose a new method for implementation of secure Bluetooth piconet. Two requirements for the systems must be considered, i.e., privacy and authentication. Privacy ensures that an eavesdropper cannot intercept conversations between two slaves in piconets. Authentication ensures that service is not obtained fraudulently in order to avoid charge for usage. Additionally, a new key distribution scheme is designed for practical implementation in a low-cost and low-power Bluetooth piconets....

>=In this article, we will propose a new method for implementation of secure Bluetooth piconet. Two requirements for the systems must be considered, i.e., privacy and authentication. Privacy ensures that an eavesdropper cannot intercept conversations between two slaves in piconets. Authentication ensures that service is not obtained fraudulently in order to avoid charge for usage. Additionally, a new key distribution scheme is designed for practical implementation in a low-cost and low-power Bluetooth piconets. We use the elliptic curve cryptography in our method for Bluetooth network. We have solutions to Bluetooth devices registration and Bluetooth piconets establishment.

在本篇論文裡,我們提出了一個新方法來實現安全的藍芽微網(Bluetooth Piconet)。我們考量了兩個必要需求於此方法中:私密性及驗證性。私密性確保不當竊聽者無法攔截微網內藍芽設備間之通訊內容;驗證性確保不法使用者不能否認所運用的通訊服務費用。本文主要採用了橢圓曲線密碼系統(Elliptic Curve Cryptography)根據藍芽網路環境來提出安全上的機制。針對藍芽設備註冊程序、藍芽微網建立程序中的相互認證階段及會議金鑰協議階段分別提出方法。

 
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关钥协议的内容
在知识搜索中查有关钥协议的内容
在数字搜索中查有关钥协议的内容
在概念知识元中查有关钥协议的内容
在学术趋势中查有关钥协议的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社