1·This paper proposes a new authenticated key agreement protocol.
提出一个新的高效认证密钥协商协议。
2·Property retrieves the date and time of the start of the key agreement protocol by the originator.
属性检索发信方开始密钥协议的日期和时间。
3·An example Business Agreement protocol is itself called Business Agreement and is a compensation protocol.
业务协定协议(Business Agreement protocol)的一个例子就是它自己,被称作业务协定(Business Agreement) 它是一个补偿协议。
4·Object that contains the value of the date and time of the start of the key agreement protocol by the originator.
对象,该对象包含发信方开始密钥协议的日期和时间值。
5·Combined with complete binary tree architecture, a new identity-based group key agreement protocol is proposed in this paper.
文中结合完全二叉树结构,提出了一种新的基于身份的群密钥协商协议。
6·Attack, a method of resisting server compromise attack is given and a new password-based authenticated key agreement protocol is proposed.
针对服务器泄漏攻击,给出了抵抗这种攻击的方法,提出了一个新的基于口令的认证密钥协商协议。
7·Based on tree and threshold idea Wang et al. proposed an efficient group key agreement protocol (TTS) and claimed that their protocol is secure.
基于树结构与门限的思想,王志伟等人提出了一个高效的组密钥协商协议(TTS协议),并认为他们的协议是安全的。
8·There is an agreement protocol between a scope and its parent scope to determine the outcome of the long-running transaction represented by a scope.
在作用域和它的父作用域之间有一个同意协议(agreement protocol),可用于确定作用域所代表的长期运行的事务的结果。
9·In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.
本文分析了IMS认证与密钥分配协议的过程,找出了认证协议中的安全缺陷,并给出了攻击者可能进行的攻击。
10·This paper proposed a new certificateless two-party key agreement protocol using pairing operation in elliptic curves, it only required each party to compute one pairing.
应用椭圆曲线的配对运算,提出了一个两方的无证书密钥协商协议,其中每一方只需计算一个配对,并证明了它在ECK模型下的安全性。