cryptographic protocol 中文意思是什麼

cryptographic protocol 解釋
安全協議
  • cryptographic : 關于暗號的, 用密碼寫的
  • protocol : n 1 議定書;調查書,始末記。2 (條約等的)草案,草約;(羅馬教皇詔書等的)首尾程式。3 〈the P 〉 ...
  1. In this dissertation we present a general, extensible methodology that examines cryptographic protocols. our approach is specify a protocol in cpal ( cryptographic protocol analysis language ), apply hoare and dijkstra ? theory of formal semantics to it, analysis it ? forma ] semantics, define weakest precondition of each kind of language statement

    我們的方法就是用cpal ( cryptographicprotocolanalysislanguage )語言來表示協議,將hoare和dijkstra在形式語義方面的理論應用到該語言,分析該語言的形式語義,定義每種語句的最弱前置條件。
  2. The termless security of quantum cryptographic key protocol is based on the quantum non - clone principle and heisenberg uncertainty principle. whilst, these two characteristics mentioned above contributes greatly to solve the problems of low transmitting rate, complicated operation and forge - identity assault in the bb84 protocol

    量子密鑰協議的無條件安全性能主要建立在量子不可克隆定理和heisenberg的測不準原理兩大理論基礎上的,但也正是由於量子的這兩種特性導致在bb84協議中存在了傳輸效率低下、操作復雜、假冒身份攻擊等方面的問題。
  3. ( 2 ) the author introduces a new way to describe cryptographic protocol based on timed petri net, meanwhile, the concrete steps using tpn is expounded

    ( 2 )首次提出用時延petri網作為工具來分析和評估密碼協議,並且給出了用它分析和評估密碼協議的具體方法和步驟。
  4. But at present, many mobile banking systems only use some cryptographic algorithms as security measures, without depicting the procedure of message exchanging as a secuity protocol, needless to say how to analyze it or provide the correctness proof of it

    但目前很多手機銀行系統中只是簡單的使用了若干密碼演算法作為安全措施,沒有把消息交換過程抽象描述成安全協議的形式,更談不上對其進行形式化的分析證明。
  5. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。
  6. ( 6 ) at last this thesis builds the structure of the automatic tool based on timed petri nets to analyze cryptographic protocol

    最後,本文建立了實現自動化分析密碼協議工具?時延petri網分析器的結構框架。
  7. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。
  8. Because of its compactness, fineness and unambiguity, formal analysis of cryptographic protocol has been an efficient and correct method step by step. the dissertation mainly discusses using formal methods for analysis and evaluation of cryptographic protocols based on timed petri nets ( tpn )

    形式化分析由於其精煉、簡潔和無二義性逐步成為分析密碼協議的一條可靠和準確的途徑,但是密碼協議的形式化分析研究目前還不夠深入,本文主要研究了基於時延petri網的密碼協議分析和評估方法。
  9. Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties

    傳輸層安全協議( tls )和安全套接字層協議( ssl )基於對稱密碼技術、非對稱密碼技術、消息認證碼技術、公鑰證書和公開密鑰基礎設施技術提供了保證網路通信數據的機密性、完整性和對通信各方進行認證的機制。
  10. This platform utilizes several techniques, including cryptographic algorithms, one - way hash function, digital certification, secure protocol, watermarkng and etc. based on this platform, a new authentication and key exchange protocol is presented and has been well applied to this transmission platform

    該傳輸平臺使用了多項技術,包括密鑰演算法、單項散列函數、數字證書、安全協議和數字水印等技術。針對該傳輸平臺,提出了一個新的認證和密鑰交換協議,並在傳輸平臺得到了很好的應用。
  11. Then, a solution of terminal - based atm cryptographic system is proposed, the layout of the security services in such system is considered, and the hardware modules involved are designed and the architectures of them are presented. in addition, a point - to - point secure messages exchange protocol on atm user plane is presented and is integrated into the atm driver. finally, some real world issues are pointed out and some discussions are made

    本文在對atm網路的安全問題進行深入研究的基礎上,參考國外的研究思路,結合國內目前在atm設備開發方面的實際情況,提出了一種基於終端的atm網路安全保密系統解決方案;探討了該系統中各種安全業務的配置情況;設計了其中所涉及到的各種硬體模塊並給出了原理性結構圖;設計並開發了一種利用用戶面用戶通道實現的點到點安全消息交換協議;提出並解決了系統實現時應該考慮的一些問題。
  12. Modification of bb84 quantum cryptographic protocol

    84量子密鑰分配協議的改進
  13. Analysis of cryptographic protocol based on coloured petri nets

    網的密碼協議的分析
  14. Ikev2 is a cryptographic protocol and its security is very important

    Ikev2作為一個密碼協議,安全性是非常重要的。
  15. This paper includes three importance parts : the platform structure, the basis knowledge of the cryptographic and the fair exchanging protocol

    本論文的研究重點主要包括平臺的架構、密碼學的基本原理和公平交易協議三部分。
  16. Through studying the basis knowledge of the cryptographic, analysing the platform structure, the platform based on digital watermarking technology and fair exchange protocol is presented in this paper

    本系統根據數字作品網上交易中出現的問題做了分析,得出主要需解決的兩方面:版權問題和公平交易問題。
  17. Modeling yahalom protocol - creating and putting out share secret bases on symmetry cryptography - in strand space, the security of this protocol is proved by a convenient method which founds on strand space theory. finally, herein this authentication method, we give some advices in cryptographic protocols design

    本文給出了基於對稱密碼演算法產生和發布共享秘密的yahalom協議的串空間模型,並運用基於串空間理論的一種簡便認證方法對其安全性進行了驗證,證明了該協議的正確性;並且針對這一認證方法,給出了安全協議設計的幾點建議。
  18. This method not only specifies the structure and dynamic properties but also evaluates the performance of cryptographic protocol ( mainly time delay and software complexity ). ( 3 ) firing rules of timed petri nets and the definition and algorithm of timed reachable graph are given

    ( 3 )給出了時延petri網的引發規則、時間可達圖定義和構造演算法,並且介紹了時延petri網的兩個基本分析方法:時間可達圖(或可覆蓋圖)和狀態方程。
  19. Then, it introduce several cryptographic protocol based on elliptical curve, including diffie - hellman key switching, elgamal encryption and decryption, elgamal digital signature, ecdsa, etc. based on these, the author analyze kinds of security threat faced to 3g system and discuss the security rule and security objectives

    然後介紹了基於橢圓曲線的幾種密碼協議,包括diffie ? hellman密鑰交換, elgamal加解密, elgamal數字簽名, ecdsa等協議。在此基礎之上,分析了3g系統面臨的各種安全威脅並對系統的安全原則和安全目標進行了討論。
  20. Then the bb84 + protocol may be divided into three parts : identity clarification, cryptographic distribution and noises simulation, and consequently the author illustrates the detail of some parts and presents the program chats

    將bb84 +量子密鑰分配協議劃分成身份認證、密鑰分配、噪聲模擬三個大的部分,並對其中的細節做出了描述,並給出了程序流程圖。
分享友人