网站首页  词典首页

请输入您要查询的词汇:

 

1 A more secure protocol is HTTPS (HTTP over SSL), which uses SSL to encrypt HTTP messages.
2 After a secure protocol is bought forward, the security must be verified on its various aspects as possible as we can.
3 The paper studies the English auction secure protocol. An efficient and secure English auction protocol is proposed with signature based on proof of knowledge.
4 The policy defines the secure protocol and credential passing required for secure interoperability between the TCS and the service.
5 The approach can be applied to all secure protocols, and it is easier for people to design secure protocol, and to implement the auto-design of secure protocol.
6 A proved secure protocol for watermark verification based on perfect zero knowledge interactive proof system and bit commitments scheme is proposed.
7 If you want to use a more secure protocol, refer to the CVS manual in Resources.
8 It is a more efficient and secure protocol, which solves the bottleneck problem of trusted third party.
9 This paper proposes a new RFID secure protocol which uses the mechanism that the random sequence stored in the tag produces the pseudo random number to replace the random value generator.
10 Analysis results show that it is a secure protocol and more efficient than other protocols.
11 Communications among IKE protocol and policy-management module and Secure protocol module are implemented by PF_KEY socket. Policy-management is the basement of implementation of IPSEC protocol.
12 The Linden Lab approach appears to be to focus on a secure protocol such that untrusted clients are not a threat, and publish everything.
13 At its inception, DNS was not designed to be a secure protocol. Because of its vulnerability, DNS faces many threats from a variety of aspects.
14 In this paper, a bilateral-authentication cryptographic protocol is proposed. It is a more efficient and secure protocol,[www.Sentencedict.com] which solves the bottleneck problem of the trusted third party.
15 Set forth a cipher synchronization scheme in the connectionless oriented IP layer, also present the state transform map of this secure protocol.
16 Verifiable secret sharing, group signature and signature of knowledge are useful in protecting important and sensitive information and always used in designing secure protocol of cryptology.
17 Based on two basic protocols of secure multi-party computation, a secure protocol is designed for determining whether two spacial spheres intersect, and its correctness and security are analyzed.
18 Traditionally, the security of cryptographic chips depends on the mathematic complexity of the cryptographic algorithms, the authentication mode and the secure protocol.
19 The way to implement the authority and authentication using middleware as well as related secure protocol is discussed. The security of the system's architecture is also analyzed.
词汇 Secure protocol in a sentence (esp. good sentence like quote, proverb...)
随便看

 

英汉词典包含105390条英汉翻译词条,涵盖了常用英语单词及词组短语的翻译及用法,是英语学习的必备工具。

 

Copyright © 2004-2025 jjyon.cn All Rights Reserved
京ICP备2024077663号-36 更新时间:2025/05/19 19:42:00