• Both the symmetric key systems and public key systems currently used are based on the model of computational security.

    目前密钥系统无论是单钥体制还是公钥体制建立计算安全模型上。

    youdao

  • The proposed group key establishment scheme reduces both the computational overhead and communication costs and has the high security and usability.

    提出密钥建立方案有效地降低了组密钥建立过程的计算通信开销具有较高安全性可用性

    youdao

  • The scheme is characterized by high security, small computational complexity, and small amount of information that should be kept. The scheme is relatively efficient.

    整个方案安全性涉及计算复杂度保存信息因而效率高且实用

    youdao

  • The ultimate goal of the project is to provide foundations to help transform security engineering into a theory-based computational discipline.

    这项计划最终目标将软件安全工程转化为基于理论的计算性学科提供必要的基础支持。

    youdao

  • The scheme is characterized by a high security, a small computational complexity, and small amount of information that should be kept. So the scheme is relatively...

    整个方案安全性、涉及计算复杂度保存信息量少,因而效率较高

    youdao

  • The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

    加密算法安全性很大程度上取决于暴力破解的不可行性

    youdao

  • The results of security analysis and efficiency analysis show that the new protocol realizes the secure communications under the low computational cost.

    安全性分析性能分析显示协议以较低的代价实现通信双方的安全通信。

    youdao

  • The results of security analysis and efficiency analysis show that the new protocol realizes the secure communications under the low computational cost.

    安全性分析性能分析显示协议以较低的代价实现通信双方的安全通信。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定