期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
协议测试领域显峥嵘——泰克通信协议分析仪介绍
1
《电子产品世界》 1998年第9期59-59,共1页
通信测试家族又添一员Tektronix(泰克)是世界第二大的仪表公司,去年营业额约为20亿美元。测量仪器部是泰克公司最大的部门,经营的仪表主要包括高档示波器、逻辑分析仪、电视测量仪器、通信测试的SDH传输分析仪、OT... 通信测试家族又添一员Tektronix(泰克)是世界第二大的仪表公司,去年营业额约为20亿美元。测量仪器部是泰克公司最大的部门,经营的仪表主要包括高档示波器、逻辑分析仪、电视测量仪器、通信测试的SDH传输分析仪、OTDR、TDR、时钟抖动、漂移测试仪... 展开更多
关键词 通信协议分析 协议测试 通信系统
下载PDF
基于模型转换的通信协议自动分析 被引量:1
2
作者 陈海波 赵伟华 《机电工程》 CAS 2009年第5期48-51,共4页
针对目前网络通信相关领域中协议分析程序复用程度不高且算法需要随协议版本变化不断修正的情况,在模型转换技术基础上设计了一种有限自动机模型到UML模型的转换算法,根据此算法开发了一个协议自动分析程序,能够实现使用一套程序同时进... 针对目前网络通信相关领域中协议分析程序复用程度不高且算法需要随协议版本变化不断修正的情况,在模型转换技术基础上设计了一种有限自动机模型到UML模型的转换算法,根据此算法开发了一个协议自动分析程序,能够实现使用一套程序同时进行多种类型的通信协议分析,且算法不会随协议版本变化而变化。研究结果表明,该算法提高了协议分析程序的复用性,在GPS通信系统实例中得到了应用。 展开更多
关键词 模型转换 通信协议自动分析 统一建模语言
下载PDF
数据库安全协议研究与实现 被引量:1
3
作者 凃云杰 《现代电子技术》 北大核心 2016年第21期116-119,共4页
鉴于Cache数据库多种访问方式,利用Antlr语法产生工具完成Cache对象脚本语法和SQL脚本语法向中间表示语言的转换以便于设置统一的审计规则。该系统的主要功能包括Cache协议分析和Cache对象脚本语法转换等。在实现过程中用人工方法编写... 鉴于Cache数据库多种访问方式,利用Antlr语法产生工具完成Cache对象脚本语法和SQL脚本语法向中间表示语言的转换以便于设置统一的审计规则。该系统的主要功能包括Cache协议分析和Cache对象脚本语法转换等。在实现过程中用人工方法编写和收集大量测试用例,确定了协议分析模块能够起到对Cache数据库进行安全审计的作用。 展开更多
关键词 通信协议分析 数据库安全审计 Cache对象脚本语言 cache协议分析
下载PDF
新的USB扩展配件OP-SB84
4
《电子设计工程》 2011年第19期25-25,共1页
OP-SB84是一款USB2.0通信协议扩展板.可插入电池驱动便携式通信协议分析仪LE-8200的插槽。 该产品可自动检测目标设备的通信速度(480 Mbps/12 Mbps/1.5 Mbps),并在液晶显示屏上实时显示出USB数据包,同时在100兆字节采集存储器... OP-SB84是一款USB2.0通信协议扩展板.可插入电池驱动便携式通信协议分析仪LE-8200的插槽。 该产品可自动检测目标设备的通信速度(480 Mbps/12 Mbps/1.5 Mbps),并在液晶显示屏上实时显示出USB数据包,同时在100兆字节采集存储器上记录下数据。除USB数据包外,它还可记录总线活动,比如时间标记信息的重置和暂停。 展开更多
关键词 USB2.0 通信协议分析 OP 配件 液晶显示屏 电池驱动 通信速度 目标设备
下载PDF
Data Transit推出Bus Doctor^TMRx
5
《电子设计应用》 2003年第4期105-105,共1页
关键词 BusDoctor^TMRx DataTransit 通信协议分析
下载PDF
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
6
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution "Ping-pong" protocol extended three-particle GHZ state eavesdropping detection
下载PDF
Research and improvement on the limitation of authentication test
7
作者 刘家芬 Zhou Mingtian 《High Technology Letters》 EI CAS 2008年第3期266-270,共5页
This paper elaborated on the limitation of authentication test theorem, illustrated the fundamental cause of that limitation through examples, then enhanced authentication test to solve this problem, and also proved t... This paper elaborated on the limitation of authentication test theorem, illustrated the fundamental cause of that limitation through examples, then enhanced authentication test to solve this problem, and also proved the soundness of that improvement with formal method. The enhanced theory can deal with protocols with test component as proper subterm of other regular node' s component under certain conditions, and extend the application scope of authentication test. With enhanced authentication test, the automatic protocol verification tools will be more efficient and convenient. 展开更多
关键词 authentication test strand space formal method security protocol analysis
下载PDF
Analysis on the Security Enhancement Model of Communication System based on Chaotic Encryption and Analytic Hierarchy Process
8
作者 Qianfei Huang 《International Journal of Technology Management》 2016年第10期28-30,共3页
In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by... In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by the communication protocol. The communication protocol can be divided into application layer, transport layer, network layer, link layer and physical layer. By using the communication protocol, the security control of the network communication can meet the needs of the information network security communication. This paper integrates the chaos system to further implement the robust system architecture. The algorithm of this paper tries to make the maximum value of the above three parameters in each iteration step by step and the output feedback to dynamically change these parameters. Compared with other algorithms, our method can adopt more related theories to perform the better result. 展开更多
关键词 Security Enhancement Communication System Chaotic Encryption Analytic Hierarchy Process
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部