• 因而国际上逐渐形成了理论认证理论声誉理论

    The international community gradually formed two types of theories: certification theory and reputation theory.

    youdao

  • 文章介绍现有信息隐藏系统模型攻击形式指出加入认证理论必要性

    This paper introduces the attack form to IH system model, points out the necessary of adding authentication theory.

    youdao

  • 一些学校只好决定撤销花费最大课程尤其是新的文凭一种一边学习理论,一边参加培训的资格认证)估计花费是大学的两倍

    Some say they will have to abandon the most costly courses, in particular the new “diploma”, a semi-academic, semi-vocational qualification that they reckonis twice as expensive to run as A-levels.

    youdao

  • 空间认证测试理论进行了形式分析最后探讨了TLS协议中的应用

    And its formal analysis is presented using authentication test theory in the strand Spaces. Finally its applications to TLS protocol are discussed.

    youdao

  • 身份识别认证以及数字签名技术现有安全理论保证网络环境下信息安全传输的有力手段

    Identification recognition, authentication and digital signature are strong methods of available security theories to secure safe transmission in network environment.

    youdao

  • 本文理论实践地道英语中国英语、口试样本语音书籍编排等角度进行了认证提供借助于音乐特色培训纲要。

    The present paper provides authentication from theory and practice, from pure English and "Chinese English", and from oral test samples and organization of phonetic books.

    youdao

  • 对照电子商务数字证书认证机构理论分析,以重庆市数字证书认证中心有限公司为案例进行全面细致的分析和研究

    According to the theories of EC and Certification Authority, this article has do a total accord analyses and studies to the ChongQing Certification Authority Company.

    youdao

  • 一种理论可行性通过实物检验认证的。

    The feasibility of a theory must be tested for certification through the physical.

    youdao

  • 本论文主要完成以下工作:(1)指纹技术电子商务安全认证理论分析

    The main thesis completed the following work: 1. Fingerprint technology and e-commerce security certification of the theoretical analysis.

    youdao

  • 由于缺乏有效认证中心银行支持所以有些功能未能实现但是部分理论已得到了有效证明。

    Because lacks the effective authentication center and the bank support, therefore some functions have not been able to realize, but this part in theoretically obtained the effective proof.

    youdao

  • 对于如何实现当庭认证理论实践中不同理解

    In terms of how to realize the authentication at court, different understandings exist in theory and practice.

    youdao

  • 身份认证密码学理论基础分析。

    Cryptology is the foundation of authentication.

    youdao

  • 通过具体案例检验验证了认证体系一定理论价值实用价值,具有实践操作性。

    After this certification system is verified through a concrete case, it is proved that it has certain theoretical value, practical value and operating nature of practice.

    youdao

  • 认证字典一类重要数据结构众多研究领域具有重要的理论应用价值

    Authenticated Dictionary (AD) is one of the important data structures, and it is of great theoretic and applicable value in many research fields.

    youdao

  • 信息认证逻辑起点,审计理论框架信息认证审计本质、审计目标、审计假设、审计准则要素组成。

    The theoretical framework for auditing consists of message authentication, audit essence, auditing objective, audit hypothesis, and auditing standard, etc.

    youdao

  • 根据侵权一般理论分析了认证机构内部工作人员责任

    The liability of employees is also analyzed according to the general theory of infringement.

    youdao

  • 基于PDX体制构造理论,设计出一个单向认证票证防伪系统分析系统安全性推广应用的技术优势

    On the base of structural theorem of PDX system, An anti-counterfeit system of document in one-way certification was released. Its safety, popularization and technology superiority were discussed.

    youdao

  • 论文主要工作包括以下几个方面:1身份认证密码学理论基础分析。

    The contributions of the dissertation are as follows. 1 Cryptology is the foundation of authentication.

    youdao

  • 理论分析实验表明协议进行文件真实性认证成功率在95%以上。

    Theoretical analysis and experiential simulation show that the protocol can successfully authenticate the authenticity of the file searched with a probability exceeding 95%.

    youdao

  • 首先给出了一种融合认证架构并且基于融合认证架构进行理论分析仿真

    A framework of integration authentication is put forward, and then the theoretical analysis and the simulation are carried out based on the integration authentication architecture.

    youdao

  • 我国关员职业认证理论现实脱节

    The theory of China's Professional Accreditation of Public Relations Practitioners are divorced from the reality.

    youdao

  • 本文首先扩展空间理想理论然后应用扩展理论分析IKE2协议核心安全:秘密性和认证性。

    In this paper, we first extend the ideal theory of Strand Spaces, and then apply this extended theory to analyzing a complex Internet key exchange protocol, LKE2.

    youdao

  • 本文首先扩展空间理想理论然后应用扩展理论分析IKE2协议核心安全:秘密性和认证性。

    In this paper, we first extend the ideal theory of Strand Spaces, and then apply this extended theory to analyzing a complex Internet key exchange protocol, LKE2.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定