青年中文青年中文

cryptographic protocols的意思

cryptographic protocols中文翻譯:

密碼協議

相似詞語短語

orthographic projections───[測]正射投影

cryptographical───adj.密碼的;暗號的

cryptographically───adv.密碼地;用暗號地

cryptographists───n.使用密碼之人;密碼專家(等于cryptographer)

homolographic projections───相應投影

Kyoto protocols───京都議定書

bibliographic controls───書目控制

cryptographic───adj.關于暗號的,用密碼寫的

cryptographist───n.使用密碼之人;密碼專家(等于cryptographer)

雙語使用場景

We present a model of computation for cryptographic protocols.───我們介紹了一個密碼協議的計算模型。

A very important factor of network security is cryptographic protocols.───網絡安全中一個非常重要的因素就是密碼協議。

So the design and analysis of cryptographic protocols are the troubles of information security.───因此密碼協議設計和密碼協議分析是信息安全領域的難題。

These works indicate that the ATL logic based on game is more suitable to describe and analyze cryptographic protocols than traditional CTL.───工作表明基于博弈的ATL邏輯比傳統的CTL更適合于描述和分析密碼協議。

A provider type that contains a set of cryptographic protocols and algorithms owned by the National Institute of Standards and Technology.───包含國家標準與技術協會擁有的一組加密協議和算法的提供程序類型。

Hierarchy Requirements and Verification for Cryptographic Protocols───密碼協議的分層安全需求及驗證

An Algorithm with Polynomial Time Complexity for Verifying Secrecy Properties of Cryptographic Protocols───一種多項式時間復雜度的密碼協議秘密性驗證方法

Formal Model and Security Analysis for Cryptographic Protocols in the Distributed Network Environment───分布式網絡環境下密碼協議形式模型和安全性

Indexed Principal Processes for Cryptographic Protocols───密碼協議主體角色進程表示

英語使用場景

However, design of cryptographic protocols is a very micromesh job, because any tiny mistake may damage security of the protocol.

It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.

Using temporal logic and algebra, a formal requirement language was presented and used to describe the formal hierarchy requirements for cryptographic protocols.

The thesis also objectively evaluates the performance of time delay, structure properties and software complexity of the above three cryptographic protocols.

Strand space theory is a method for stating and proving correctness properties for cryptographic protocols.