| 1. | Modification of bb84 quantum cryptographic protocol 84量子密钥分配协议的改进 |
| 2. | Design and analysis of cryptographic protocols for rfid 安全协议的设计与分析 |
| 3. | Analysis of cryptographic protocol based on coloured petri nets 网的密码协议的分析 |
| 4. | Strand space model to prove the security of cryptographic protocols 用于密码协议安全性证明的串空间模型 |
| 5. | Such functions play a major role in many cryptographic protocols 此类函数在许多密码协定中起著重要作用。 |
| 6. | Ikev2 is a cryptographic protocol and its security is very important Ikev2作为一个密码协议,安全性是非常重要的。 |
| 7. | The analysis is also made on the cryptographic protocols of tpm 因此,也对可信平台模块密码学协议的安全性进行了分析。 |
| 8. | The cryptographic protocols of tpm are also the security base of tpm 可信平台模块的密码学协议亦是可信平台模块安全的基础。 |
| 9. | 6 li gong , roger needham , raphael yahalom . reasoning about beliefs in cryptographic protocols 我们将使用一类特殊的等价的kripke语义,即知识结构 |
| 10. | Firstly , a formal description of the cryptographic protocols of tpm is made using svo logic 首先,使用的svo逻辑建立可信平台模块密码学协议的形式化描述,然后进行推理分析。 |