| 1. | Analysis of cryptographic protocol based on coloured petri nets 网的密码协议的分析 |
| 2. | New approach for formal analyzing encryption protocols 一种新的密码协议分析方法及其应用 |
| 3. | Strand space model to prove the security of cryptographic protocols 用于密码协议安全性证明的串空间模型 |
| 4. | Ikev2 is a cryptographic protocol and its security is very important Ikev2作为一个密码协议,安全性是非常重要的。 |
| 5. | A rekeying method that can provide data confidentiality services and data integrity services is given 该密码协议提供数据保密性和完整性服务。 |
| 6. | 9 bellare m , rogaway p . random oracles are practical : a paradigm for designing efficient protocols 利用尽可能弱的数论假设构造尽可能高效的密码协议是密码方案设计的重要原则 |
| 7. | Public key cryptography for the financial services : agreement of symmetric keys using discrete logarithm cryptography 金融业务的公开密钥加密:使用离散对数密码术的对称密码协议 |
| 8. | ( 6 ) at last this thesis builds the structure of the automatic tool based on timed petri nets to analyze cryptographic protocol 最后,本文建立了实现自动化分析密码协议工具?时延petri网分析器的结构框架。 |
| 9. | The realization issues of these protocols important for the security aspect are discussed and a review of current experimental progresses in the field is presented 从安全方面讨论了量子密码协议实现方案存在的一些问题,并介绍了当前实验研究的进展。 |
| 10. | ( 5 ) the thesis also objectively evaluates the performance of time delay , structure properties and software complexity of the above three cryptographic protocols ( 5 )本文对这三种密码协议的执行时间、结构特性以及实现分析的软件复杂度给出了客观的评估。 |