• The security analysis of scheme is proposed.

    还给出了该方案安全性分析

    youdao

  • The security analysis of two scheme is proposed.

    还给出两种方案安全性分析

    youdao

  • And so this concludes my song and Web security analysis.

    歌曲Web安全性分析结束了。

    youdao

  • Describe the flow of the AODV after modification and carry out security analysis.

    描述修改AODV协议流程进行安全分析

    youdao

  • In the security analysis, we presented two hard problems over elliptic curves as well.

    方案的安全性分析中,我们还提出了椭圆曲线上的困难问题

    youdao

  • Fast transient stability analysis method is the core of the online dynamic security analysis.

    在线动态安全分析核心快速分析。

    youdao

  • The security analysis shows it can prevent plaintext attack, conspiracy attack and forging attack.

    安全性分析表明方案能够防止明文攻击合谋攻击伪造攻击。

    youdao

  • The security analysis of the network file service system is able to validate the security of model.

    通过网络文件服务系统安全性分析验证模型的安全性。

    youdao

  • Finally, we give a simple security analysis of the protocol to show that it fulfils these requirements.

    最后协议进行了简要安全分析证明能够满足这些安全要求。

    youdao

  • The security analysis of the new scheme shows that it can resist all kind of outsider and insider attacks.

    安全分析表明抵抗各种内部外部攻击,是一种安全多重签名方案

    youdao

  • Its result indicates that causality diagram is more effective than FTA in security analysis and assessment.

    结果表明因果方法可以有效地进行安全分析安全评估而且故障树分析法效果好

    youdao

  • Assist to complete each promotion of financial product, and participate in making the security analysis report.

    协助完成各项金融产品推广参与完成证券分析报告。

    youdao

  • This paper introduces the MD5 algorithm and security analysis. A new keyed hash algorithm based on MD5 is proposed.

    介绍MD 5算法对它的安全性能分析,提出了基于MD5键控散列算法。

    youdao

  • Secondly, it introduces requirement analysis , functional analysis of all modules, security analysis of the system.

    然后介绍了系统需求分析,系统模块的功能分析以及系统安全性分析等。

    youdao

  • Through the security analysis, the model has settled users' bestriding problem yet still achieved security property.

    安全分析表明,解决用户跨步问题的前提下,没有降低模型安全性

    youdao

  • In some ways his new book, "Slow Finance", is in the tradition of Benjamin Graham, the founder of modern security analysis.

    新书迟缓金融某种程度完全承袭本杰明·格雷厄姆现代安全分析创始人

    youdao

  • This measure method supplies reliable data for security analysis and designing installed flange of steam turbine 's vane.

    此项技术可汽轮机叶片安装轮缘设计安全性分析提供可靠依据。

    youdao

  • The proposed method is also suitable for the security analysis of reactive power correction in large-scale interconnected power systems.

    方法适用大型互联电力系统校正安全分析

    youdao

  • Experiment result is significant for safe operation of nuclear heating reactor and security analysis program to confirm small break LOCA.

    实验结果供热安全运行验证破口事故安全分析程序重要意义。

    youdao

  • As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.

    随着信息技术安全问题日益突出网络系统进行安全分析日益重要

    youdao

  • Security analysis and market analysis are alike, therefore, in the fact that they deal with data that are not conclusive as to the future.

    价值派技术派类似,是根据历史数据判断并不绝对相同未来。

    youdao

  • The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.

    针对计算机系统安全故障方法网络信息系统攻击方法应用了这一安全分析建模工作。

    youdao

  • The research of security analysis needed a systemic security analysis model that was from the system resource and security factor of computer network.

    安全性分析研究工作需要计算机网络安全相关系统资源安全因素抽取出来建立一种面向安全性分析的安全模型

    youdao

  • It's certainly better to use TLS than inventing your own solution. Additionally, you'll benefit from a protocol that has withstood careful security analysis.

    使用TLS肯定自己发明解决方案要好另外,使用经得起仔细安全分析的协议从中获益

    youdao

  • This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.

    本文提出面向消息中间件的分布式认证协议给出协议内容形式化描述以及安全性分析。

    youdao

  • The focus is on open source technologies, but there are also mentors for Secure software's CodeAssure product line for automated security analysis of software.

    集中开源技术上,不是检查安全软件代码保证产品线

    youdao

  • In order to run IP on an ATM-based network, new protocols are developed. However, these protocols have not yet been subjected to a thorough security analysis.

    为了AT M网上实现IP传输,人们提出了一些新的协议这些协议本身的安全性没有进行深入地了解和验证。

    youdao

  • The experiment results show that, content-security analysis in CIPS can effectively block junk email, prevent network virus and sift banned content in real time.

    实验表明CIPS网络内容安全分析能够阻塞垃圾邮件、防御网络病毒过滤违禁内容。

    youdao

  • This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.

    本文提出一种基于信息系统安全性分析来定量计算信息安全风险度量尺度差距分析方法相应评估流程

    youdao

  • This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.

    本文提出一种基于信息系统安全性分析来定量计算信息安全风险度量尺度差距分析方法相应评估流程

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定