Modification of bb84 quantum cryptographic protocol 84量子密鑰分配協(xié)議的改進(jìn)
Design and analysis of cryptographic protocols for rfid 安全協(xié)議的設(shè)計(jì)與分析
Analysis of cryptographic protocol based on coloured petri nets 網(wǎng)的密碼協(xié)議的分析
Strand space model to prove the security of cryptographic protocols 用于密碼協(xié)議安全性證明的串空間模型
Such functions play a major role in many cryptographic protocols 此類(lèi)函數(shù)在許多密碼協(xié)定中起著重要作用。
Ikev2 is a cryptographic protocol and its security is very important Ikev2作為一個(gè)密碼協(xié)議,安全性是非常重要的。
The analysis is also made on the cryptographic protocols of tpm 因此,也對(duì)可信平臺(tái)模塊密碼學(xué)協(xié)議的安全性進(jìn)行了分析。
The cryptographic protocols of tpm are also the security base of tpm 可信平臺(tái)模塊的密碼學(xué)協(xié)議亦是可信平臺(tái)模塊安全的基礎(chǔ)。
6 li gong , roger needham , raphael yahalom . reasoning about beliefs in cryptographic protocols 我們將使用一類(lèi)特殊的等價(jià)的kripke語(yǔ)義,即知識(shí)結(jié)構(gòu)
Firstly , a formal description of the cryptographic protocols of tpm is made using svo logic 首先,使用的svo邏輯建立可信平臺(tái)模塊密碼學(xué)協(xié)議的形式化描述,然后進(jìn)行推理分析。
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods.