军事学 >>> 军事学
搜索结果: 1-3 共查到军事学 Proof Method相关记录3条 . 查询时间(0.062 秒)
A secure hash structure in Random Oracle Model may not be a secure model in true design. In this paper, we give an integrated proof method on security proof of iterated hash structure. Based on the...
We develop a compositional method for proving cryptograph- ically sound security properties of key exchange protocols, based on a symbolic logic that is interpreted over conventional runs of a prot...
We investigate inductive methods for proving secrecy properties of network protocols, in a “computational” setting applying probabilistic polynomial-time adversary. As in cryptographic studies, se...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...