您要查找的是不是:
- Needham-Schroeder認證協(xié)議Needham-Schroeder authentication protocol
- Needham-Schroeder公鑰協(xié)議的模型檢測分析Model Checking Analysis of Needham-Schroeder Public-Key Protocol
- 認證authenticate
- 協(xié)議pact
- 采用BAN邏輯對著(zhù)名的Needham Schroeder(NS)協(xié)議建立理想化協(xié)議模型 ,利用協(xié)議的初始假設和BAN邏輯的公設分析NS協(xié)議的安全性 .BAN logic was used to construct an ideal model of the well known Needham Schroeder protocol.
- 本文使用這種反向驗證方法驗證了A(0)協(xié)議和Needham-Schroeder公開(kāi)密鑰協(xié)議,給出了推導過(guò)程以及攻擊路徑,并且定位了協(xié)議所存在的問(wèn)題。This document verified A(0) protocol and Needham-Schroeder public key protocol with the reversing verification method, with the reasoning process and attacking trace being given and the protocol problem being located.
- 安全認證Security Certificate
- 協(xié)議的consultative
- 認證機構certification authority
- Schroeder方程SchrSder equation
- 達成協(xié)議make terms
- Cercion plagiosum(Needham); 山(?)They are Coenagrionidae: Cercion plagiosum(Needham);
- 補充協(xié)議complementary agreement
- 保密協(xié)議Confidentiality agreement
- 基于公開(kāi)密鑰算法的可否認認證協(xié)議Deniable Authentication Protocol Based on Public Key Algorithm
- 網(wǎng)絡(luò )協(xié)議network protocol
- 合作協(xié)議cooperation agreement
- 通信協(xié)議communication protocols
- 傳輸協(xié)議transport protocols
- 這種方法采用的認證協(xié)議同時(shí)結合了公鑰加密和密鑰加密技術(shù)。The proposed security and authentication protocol made use to the combination of public key and secret key to provide such ploy.