英语人>网络例句>协议 相关的搜索结果
网络例句

协议

与 协议 相关的网络例句 [注:此内容来源于网络,仅供参考]

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议

Preparation and negotiation of a range of other contractual agreements (including Confidentiality Agreements, Novation Agreements and Assignment Agreements etc.).

对一系列的其他合同协议(包括保密协议、更新协议和转让协议等)进行准备和谈判。

2In this paper ,we analyze some popular authentication protocols in the world now,such as Needham-Schroeder, Otway-Rees and Kerberos.The designing principles of electronic commerce protocols are introduced,such as Anonymity, Non-Reputation, Fairness and so on.The payment protocols for elcectronic commerce are introduced too.

对目前的一些典型的安全认证协议,如:Needham-Schroeder、Otway-Rees、Kerberos等进行了简要的分析,阐述了电子商务协议的设计原则,如匿名性、不可否认性、公平性、安全性等,介绍了相关的电子支付协议,并讨论了安全协议设计和分析中所要注意的一些问题。

After analysing the off-line negociation and on-line agreement supported by parlay specification,it gives out the drawbacks.

对组成服务水平协议的离线协议与在线协议的分析可知Parlay规范对服务水平协议的支持存在着极大的不足。

The data capture mainly gathers the data from the network. Protocol analysis can analyse every segment of the data packet according to protocol standard. Data recover can recover all the data of the application layer of the TCP connection. IP spoofing can construct all kinds of packets and realize the network attack. Real-time interruption can interrupt the TCP connection of Both sides of communication as the third party. Fire wall can realize network access control. Then the system can protect the network information safety from many aspects.

数据捕获主要完成从网络采集数据的功能;分析还原包括协议分析和数据还原两部分内容,协议分析可以对捕获到的数据包按照网络协议规范分别进行各协议字段分析,数据还原功能可以将每条TCP连接中传输的所有应用数据进行重新组合,还原出原来数据的内容;IP欺骗指构造各种功能的数据包,实现网络攻击;实时阻断指第三方实时阻断通信双方的TCP连接,禁止他们进行数据通信;防火墙主要实现网络访问控制,保护内部子网的功能。

In the third example, USC ISI's anonymous payment protocol [19] is analyzed to show that the protocol does not provide both the payor and the payee with some accountability assurances discussed in this paper, in agreement with the goals of this protocol.

在第三个例子, USC ISI 的匿名付款协议[ 19 ] 被分析表示,协议不提供payor 和收款人以一些责任保证被谈论在本文里,在与这个协议的目标的协议

The electronic payment protocol based on offline-TTP is made up of multiple sub-protocols, and is significantly different from traditional authentication protocol, especially on protocol goal and penetrator model.

基于Offline-TTP的电子支付协议通常具有复杂结构,由多个子协议组合而成,与传统认证协议具有显著不同,主要表现在协议目标和攻击者模型两个方面。

The designing and analyzing of security protocols remains a challenge for the subtlety of security goals, the uncertainty of penetrator model, the complexity of the running environment, and the high concurrency of protocol sessions.

由于协议安全属性的多样性和微妙性、攻击者模型的不确定性、协议运行环境的复杂性和协议会话的高并发性,安全协议的设计与分析至今仍是一项具有挑战性的工作。

The fourth aspect is about authentication protocols analysis in special systems. We gave out the security analysis of AKE protocol and reauthentication protocol in the POD copy protection specification. We also gave out the security analysis of AKE protocols in DTCP specification.

在特定系统中认证协议分析方面,给出了配置点拷贝保护系统中认证密钥交换协议和重新认证协议的安全分析;给出了数字电视拷贝保护规范中的完全认证协议的安全分析。

A simulation is done between MAODV and AODV with software. From the simulation results under different node speed, it indicates that MAODV could decrease the average of ETE delay and offer lower routing overhead effectively. MAODV can complete routing discovery, package retransfer and self-organize when the network topology is changed, MAODV routing protocol is useful to establish Ad hoc networks in military communication.

应用软件对MAODV路由协议和传统的ADOV路由协议进行了仿真,通过在节点不同移动速度下的网络性能进行仿真比较,结果表明,MAODV路由协议能有效地减小分组端到端传输的平均时延,降低协议开销,能够根据网络的拓扑变化进行自组织,完成路由的发现和分组的中转等基本功能,为自组网在军用通信中的运用奠定了基础。

第5/100页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Objective To investigate the effects of interleukin-1 β converting enzyme gene on the biologic characteristics of ovarian cancer cells.

目的 探讨白细胞介素-1 β转换酶的表达,对卵巢癌细胞生物学特性的影响。

Campylobacter: This illness is the most commonly identified cause of diarrheal illness in the world.

弯曲:这种病是最常见的原因查明腹泻病,在世界上。

Gangs fill the daily lives of many of our poorest and most vulnerable citizens with a terror that the court does not give sufficient consideration, often relegating them to the status of prisoners in their own homes.

法院没有充分的考虑到黑社会的猖獗所带来的恐怖,这使得我们最穷、最可怜的市民每天生活在他们的阴影当中,成为在家的囚犯。