搜索结果: 1-1 共查到“军事学 protocol composition”相关记录1条 . 查询时间(0.173 秒)
Cryptographic Protocol Composition via the Authentication Tests
Cryptographic Protocol Composition Authentication Tests syntactic criteria
2009/6/9
Although cryptographic protocols are typically analyzed in
isolation, they are used in combinations. If a protocol was analyzed alone
and shown to meet some security goals, will it still meet those ...