The security analysis of scheme is proposed.
还给出了该方案的安全性分析。
The security analysis of two scheme is proposed.
还给出两种方案的安全性分析。
And so this concludes my song and Web security analysis.
我的歌曲和Web安全性分析到此就结束了。
Describe the flow of the AODV after modification and carry out security analysis.
描述了对修改后的AODV协议的流程,进行安全分析。
In the security analysis, we presented two hard problems over elliptic curves as well.
在对方案的安全性分析中,我们还提出了两类椭圆曲线上的困难问题。
Fast transient stability analysis method is the core of the online dynamic security analysis.
在线动态安全分析的核心是快速暂稳分析。
The security analysis shows it can prevent plaintext attack, conspiracy attack and forging attack.
安全性分析表明该方案能够防止明文攻击、合谋攻击和伪造攻击。
The security analysis of the network file service system is able to validate the security of model.
通过对网络文件服务系统的安全性分析,验证了该模型的安全性。
Finally, we give a simple security analysis of the protocol to show that it fulfils these requirements.
最后,对该协议进行了简要的安全分析,证明它能够满足这些安全要求。
The security analysis of the new scheme shows that it can resist all kind of outsider and insider attacks.
安全分析表明它能抵抗各种内部和外部攻击,是一种安全的多重签名方案。
Its result indicates that causality diagram is more effective than FTA in security analysis and assessment.
结果表明因果图方法可以有效地进行安全分析和安全评估,而且比故障树分析法效果好。
Assist to complete each promotion of financial product, and participate in making the security analysis report.
协助完成各项金融产品的推广,并参与完成证券分析报告。
This paper introduces the MD5 algorithm and security analysis. A new keyed hash algorithm based on MD5 is proposed.
介绍了MD 5算法及对它的安全性能分析,提出了一个基于MD5的键控散列算法。
Secondly, it introduces requirement analysis , functional analysis of all modules, security analysis of the system.
然后介绍了系统的需求分析,系统各模块的功能分析以及系统安全性分析等。
Through the security analysis, the model has settled users' bestriding problem yet still achieved security property.
安全分析表明,在解决用户跨步问题的前提下,没有降低模型的安全性。
In some ways his new book, "Slow Finance", is in the tradition of Benjamin Graham, the founder of modern security analysis.
他的新书《迟缓的金融》在某种程度上完全承袭了本杰明·格雷厄姆,现代安全分析的创始人。
This measure method supplies reliable data for security analysis and designing installed flange of steam turbine 's vane.
此项技术可为汽轮机叶片安装轮缘的设计和安全性分析提供可靠依据。
The proposed method is also suitable for the security analysis of reactive power correction in large-scale interconnected power systems.
本方法也适用于大型互联电力系统的无功校正安全分析。
Experiment result is significant for safe operation of nuclear heating reactor and security analysis program to confirm small break LOCA.
实验结果对核供热堆的安全运行及验证小破口事故安全分析程序有重要意义。
As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.
随着信息技术安全问题的日益突出,对网络系统进行安全分析日益重要。
Security analysis and market analysis are alike, therefore, in the fact that they deal with data that are not conclusive as to the future.
价值派和技术派与此类似,都是根据历史数据来判断并不绝对相同的未来。
The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。
The research of security analysis needed a systemic security analysis model that was from the system resource and security factor of computer network.
安全性分析研究工作需要把计算机网络与安全相关的系统资源和安全因素抽取出来建立一种面向安全性分析的安全模型。
It's certainly better to use TLS than inventing your own solution. Additionally, you'll benefit from a protocol that has withstood careful security analysis.
使用TLS肯定比你自己发明解决方案要好,另外,使用经得起仔细的安全分析的协议,你能从中获益。
This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.
本文提出面向消息中间件的分布式认证协议,给出协议内容、形式化描述以及安全性分析。
The focus is on open source technologies, but there are also mentors for Secure software's CodeAssure product line for automated security analysis of software.
集中在开源技术上,而不是检查安全软件的代码保证产品线。
In order to run IP on an ATM-based network, new protocols are developed. However, these protocols have not yet been subjected to a thorough security analysis.
为了在AT M网上实现IP传输,人们提出了一些新的协议,但这些协议本身的安全性还没有进行深入地了解和验证。
The experiment results show that, content-security analysis in CIPS can effectively block junk email, prevent network virus and sift banned content in real time.
实验表明,CIPS中网络内容安全分析能够阻塞垃圾邮件、防御网络病毒、过滤违禁内容。
This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.
本文提出一种基于信息系统安全性分析来定量计算信息安全风险的度量尺度,差距分析方法及相应的评估流程。
This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.
本文提出一种基于信息系统安全性分析来定量计算信息安全风险的度量尺度,差距分析方法及相应的评估流程。
应用推荐