• Don't re-invent your own protocols and algorithms.

    不要重新发明自己的协议算法了

    youdao

  • The first step is knowing that you need these protocols and algorithms; setting it up is for another article.

    第一步骤了解需要这些协议算法;有关设置的知识请参阅另一篇文章

    youdao

  • The WSN with limited resources and dynamic topology had better adopt distributed and localized coverage control protocols and algorithms.

    对于资源受限拓扑动态变化的无线传感器网络,宜采用分布式局部化覆盖控制协议和算法。

    youdao

  • Mobility Management base on Mobile Internet is facing new challenge, Although many unicast mobility management protocols and algorithms are proposed, in order to achieve smooth hand off.

    基于移动因特网移动性管理面临新的挑战播移动性管理协议算法层出不穷,目的为了使移动节点能进行平滑切换。

    youdao

  • Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.

    维护机密性完整性典型解决方案涉及使用现有安全协议加密算法。

    youdao

  • This includes testing protocols (or algorithms) to optimize the use and benefits of the new technology in those persons where it is needed most.

    包括检测方案(算法),使那些最需要最佳使用这项技术从中最佳获益

    youdao

  • We presented several new algorithms of model checking epistemic logics, and explore their applications in verifications of security protocols.

    我们给出了一些新的模型检测算法探讨它们安全协议验证中的应用

    youdao

  • Based on the above work, our research on overlay multicast is performed in the following aspects, which include centralized routing algorithms, distributed routing protocols and system prototype.

    此基础我们分别覆盖多播集中式路由算法分布式路由协议原型系统几方面开展了研究工作

    youdao

  • Generally, the problem about cryptology comes down to the design and analysis of cipher algorithms and protocols.

    密码是网络信息安全核心,密码问题一般归结为密码算法协议设计分析问题。

    youdao

  • Secure group communication is more complicated than peer to peer communication, and poses a number of challenges ranging from basic algorithms, systems and secure protocols to secure implementation.

    相对于端的通信安全群组通信更为复杂基本算法系统安全协议到安全实现都还存在需解决问题

    youdao

  • This paper discusses some basic characters of asymmetric watermark, and review some asymmetric watermarking algorithms and asymmetric watermarking protocols.

    文章分析了非对称水印基本特征一些非对称方案,包括非对称水印算法非对称水印协议进行了讨论。

    youdao

  • These routing protocols are divided into single-copy and multiple copy algorithms, which rely on whether to allow data packets in the network is several-fold increase.

    这些路由协议分成复制复制算法这种算法依靠是否允许数据包网络多倍增加

    youdao

  • Methods to express the preparation and measurement of quantum states on current computer and the basic algorithms for simulating the quantum key distribution protocols were given.

    给出了经典计算机表示量子制备测量方法编制相应的程序,实现了多种量子密钥分配协议仿真

    youdao

  • Second existing routing protocols or algorithms are outlined and compared as the classification of plane, hierarchical as well as the position aided ones.

    接着概述现有平面层次以及位置辅助路由协议算法并做了必要的分析比较;

    youdao

  • And then time slot allocation algorithms and routing protocols based on directional antenna are designed for IFDL. At last performance of the network is simulated with OPNET.

    然后设计、提出了基于定向天线的适用机间数据链的时隙分配算法路由协议利用OPNET仿真软件验证网络性能

    youdao

  • It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.

    密码技术主要包括对称密码算法对称密码算法协议

    youdao

  • Cryptography is the core domain in the information security technique. It provides many algorithms and protocols to meet practical need.

    密码学作为信息安全技术核心领域,提供多种密码算法应用协议满足人们实际应用的需要。

    youdao

  • Knowledge of cryptography, include algorithms and protocols.

    了解密码学算法以及协议

    youdao

  • In recent years, a set of watermarking protocols with new mechanisms and algorithms have been proposed by scholars all over the world.

    近年来,国内外许多学者提出了一系列新的数字水印协议

    youdao

  • In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    youdao

  • The algorithms and protocols are the base of modern information security technology.

    这些算法协议构成了现代信息安全技术基础

    youdao

  • Theoretical and experimental results demonstrate that the proposed algorithms are able to obtain better performance than those existed protocols.

    理论实验结果证明我们改进有效地提高网络性能

    youdao

  • Theoretical and experimental results demonstrate that the proposed algorithms are able to obtain better performance than those existed protocols.

    理论实验结果证明我们改进有效地提高网络性能

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定