interlock protocol造句
例句與造句
- The Interlock Protocol was described as a method to expose a middle-man who might try to compromise two parties that use anonymous key agreement to secure their conversation.
- For this reason, the interlock protocol cannot be effectively used to provide authentication, although it can ensure that no third party can modify the messages in transit without detection.
- Where " data " is the encrypted data that immediately follows the Interlock Protocol exchange ( it could be anything ), encoded using an all-or-nothing transform to prevent in-transit modification of the message.
- In an attempt to avoid using any additional out-of-band authentication factors, Davies and Price proposed the use of the Interlock Protocol of Ron Rivest and Adi Shamir, which has been subject to both attack and subsequent refinement.
- Of course, Z could choose to not perform the Interlock Protocol with B ( opting to instead send his own Mb ) but then the session would be between A and Z, not A, Z, and B : Z wouldn't be in the middle.
- It's difficult to find interlock protocol in a sentence. 用interlock protocol造句挺難的