1) privacy and authentication
保密与认证
1.
Considering the situation, an efficient privacy and authentication protocol based on Elliptic Curve Cryptosystem is proposed.
针对AdHoc终端计算资源受限的特点,提出了一种基于椭圆曲线密码体制的AdHoc网络保密与认证协议。
2) Secrecy
[英]['si:krəsi] [美]['sikrəsɪ]
认证保密性
1.
Design and Formal Analysis of Secrecy in the Non-repudiation Protocol;
非否认协议中认证保密性的设计与形式化分析
3) encrpytion and authentication
加密与认证
4) authentication and key agreement
认证与密钥协商
1.
The security architecture and security features in 3G mobile communications system are introduced, and its network access security mechanisms including indentification by user identities, authentication and key agreement, access link data integrity protection and data encryption are discussed.
介绍了第三代移动通信系统中的安全结构以及其中定义的安全特征 ,讨论了其安全接入机制 ,包括用户标识鉴别、认证与密钥协商以及通信过程中数据完整性保护和数据加密方法 。
2.
This thesis is devoted to the study of Authentication and Key Agreement mechanism of 3G mobile communication system, which includes protocols, algorithms and implementation etc.
本文主要研究的是第三代移动通信系统的认证与密钥协商机制:包括协议、算法、实现体制等。
5) AKA(Authentication and Key Agreement)
鉴权与密钥认证
6) authentication and key agreement
认证与密钥分配协议
1.
In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.
本文分析了IMS认证与密钥分配协议的过程,找出了认证协议中的安全缺陷,并给出了攻击者可能进行的攻击。
补充资料:自愿性认证(见产品合格认证)
自愿性认证(见产品合格认证)
voluntary certification: see product conformity certification
Z叨anxing renzheng自愿性认证(volun娜cert讥cation)合格认证。见产品
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条