助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   security protocol design 的翻译结果: 查询用时:0.18秒
图标索引 在分类学科中查询
所有学科
互联网技术
计算机软件及计算机应用
更多类别查询

图标索引 历史查询
 

security protocol design
相关语句
  安全协议设计
     Security Protocol Design about Broadcast in Wireless Sensor Network
     无线传感器网络中广播通信的安全协议设计
短句来源
     An Authentication-Based Security Protocol Design Method
     基于认证测试的通用安全协议设计方法
短句来源
     Low Cost RFID System's Security Protocol Design And Formal Analysis
     低成本RFID系统安全协议设计及其形式化分析
     This paper proposes a new kind of rules about security protocol design.
     本文提出了新的对于安全协议设计的指导原则。
短句来源
     In the end, this paper introduces a new idea about security protocol design, dynamic security protocols. I hope that this new idea can open the view about security protocol design in order to bring new discussion and development.
     最后还介绍了一种全新的安全协议设计思想-动态安全协议的思想,以期能够拓宽对于安全协议设计的思路,引起新的讨论和发展。
短句来源
  “security protocol design”译为未确定词的双语例句
     A Formal Method of Security Protocol Design
     一种安全协议的形式化设计方法
短句来源
     However, the security protocol design is an error-prone process.
     然而如何保证安全协议的安全性,如何使协议的设计能够满足安全性的要求,如何提高安全协议自动化验证的效率等,都是安全协议研究领域不断探索的问题。
短句来源
     This paper proposes a new method of security protocol design using theorem proven and security protocol analyzer.
     文章以协议分析器为辅助工具,结合定理证明方法,给出了一个安全协议形式化设计方法。
短句来源
     This paper introduced an authentication tests-based method for guiding security protocol design,and uses it to redesign the Needham-Schroeder publickey protocol.
     以认证测试方法为基础,提出了一种通用的安全协议形式化设计方法,使用该方法对Needham-Schroeder(NS)公钥协议进行了重新设计.
短句来源
  相似匹配句对
     Bluetooth Security Protocol
     蓝牙协议中的安全机制
短句来源
     SECURITY
     安全
短句来源
     Security Analysis of JFK Protocol
     JFK协议的安全性分析
短句来源
     Design and Analysis of Security Protocol
     安全协议的研究与设计
短句来源
     Security
     安全性
短句来源
查询“security protocol design”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  security protocol design
The complex structure of SET makes it a benchmark for security protocol design and verification, whether or not it will be a commercial success.
      
This naturally raises the question whether the current security protocol design process is satisfactory.
      


With frequent use by the government of Internet and electron commerce, network is more and more widely applied and the security of network is more and more important. The IP security tool-IPSec uses network communication encryption techniques. IPSec is a security protocol designed for next generation IPV6, but the spread speed of IPV6 is very slow, and the requirement for secure IP protool is very urgent. So IPSec must be reapply to IPV4. Microsoft and Cisco Systems Inc have opened out the...

With frequent use by the government of Internet and electron commerce, network is more and more widely applied and the security of network is more and more important. The IP security tool-IPSec uses network communication encryption techniques. IPSec is a security protocol designed for next generation IPV6, but the spread speed of IPV6 is very slow, and the requirement for secure IP protool is very urgent. So IPSec must be reapply to IPV4. Microsoft and Cisco Systems Inc have opened out the IPSec and correlative serice in Windows 2000. But unluckily, the Linux kernel with the editions except those issued in North America does not sustain IPSec. So you should add the IPSec to the kernel for using IPSec software. This article will explain how to use and configure secure protool, and how to install and configure IPSec in Linux.

IP安全工具———IPSec使用了网络通信加密技术 .IPsec本来是为下一代IPV6设计的安全协议 ,但是IPV6的推广速度较慢 ,而社会对安全的IP协议的要求十分迫切 ,于是把IPsec重新应用于IPV4 .Microsoft和CiscoSystemsInc .共同开发了Windows 2 0 0 0中的IPSec和相关的服务 .但是不幸的是 ,北美地区以外的Linux发布版本的内核均不支持IPSec.你需要在内核中增加对IPSec的支持 ,才能使用IPSec软件 .本文主要介绍了如何在Windows 2 0 0 0中使用和配置安全策略 ,以及在Linux下安装和配置IPSec .

This paper proposes a new method of security protocol design using theorem proven and security protocol analyzer.It constructs full information items based on requirement to get a redundancy protocol firstly,and then uses theorem proven to prove the security of the designed protocol.It reduces the redundancy protocol step by step,using the reduction rules supported by theorem proven,until it gets optimized protocols which meet the requirement of protocol.The...

This paper proposes a new method of security protocol design using theorem proven and security protocol analyzer.It constructs full information items based on requirement to get a redundancy protocol firstly,and then uses theorem proven to prove the security of the designed protocol.It reduces the redundancy protocol step by step,using the reduction rules supported by theorem proven,until it gets optimized protocols which meet the requirement of protocol.The method can realize auto-design of security protocol and has good extension for design rules and reduction rules.

文章以协议分析器为辅助工具,结合定理证明方法,给出了一个安全协议形式化设计方法。该方法首先根据协议规范构造全信息项及冗余协议,使用定理证明保证冗余协议的安全性。对冗余协议利用安全性保持约简规则和随机约简规则进行约简,从而得到最优约简协议。该方法实现了安全协议的自动设计,具有良好的扩展性,可以根据需求和协议的发展增加设计规则和约简规则。

This paper introduced an authentication tests-based method for guiding security protocol design,and uses it to redesign the Needham-Schroeder publickey protocol.The redesigned protocol was verified with the authentication tests.The verification result shows that the redesigned Needham-Schroeder publickey protocol can achieve the security goal of confidentiality,identity authentication and data authentication,thus it can efficiently avoid the man-in-middle attack.

以认证测试方法为基础,提出了一种通用的安全协议形式化设计方法,使用该方法对Needham-Schroeder(NS)公钥协议进行了重新设计.最后通过认证测试方法证明了重新设计的NS协议能够满足安全协议的保密性、身份认证和数据认证的要求,并且有效避免了原NS协议存在的中间人攻击问题.

 
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关security protocol design的内容
在知识搜索中查有关security protocol design的内容
在数字搜索中查有关security protocol design的内容
在概念知识元中查有关security protocol design的内容
在学术趋势中查有关security protocol design的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社