搜索结果: 1-1 共查到“军事学 protocol security”相关记录1条 . 查询时间(0.058 秒)
Key confirmation and adaptive corruptions in the protocol security logic
Key confirmation adaptive corruptions protocol security logic
2008/11/21
Cryptographic security for key exchange and secure session establishment
protocols is often defined in the so called “adaptive corruptions” model.
Even if the adversary corrupts one of the participa...