Don't re-invent your own protocols and algorithms.
不要重新发明您自己的协议和算法了。
The first step is knowing that you need these protocols and algorithms; setting it up is for another article.
第一个步骤是了解您需要这些协议和算法;有关设置的知识请参阅另一篇文章。
The WSN with limited resources and dynamic topology had better adopt distributed and localized coverage control protocols and algorithms.
对于资源受限且拓扑动态变化的无线传感器网络,宜采用分布式和局部化的覆盖控制协议和算法。
Mobility Management base on Mobile Internet is facing new challenge, Although many unicast mobility management protocols and algorithms are proposed, in order to achieve smooth hand off.
基于移动因特网的移动性管理面临新的挑战。单播移动性管理协议和算法层出不穷,目的是为了使移动节点能进行平滑切换。
Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.
维护机密性和完整性的典型解决方案涉及使用现有的安全协议和加密算法。
This includes testing protocols (or algorithms) to optimize the use and benefits of the new technology in those persons where it is needed most.
这包括检测方案(或算法),使那些最需要的人最佳使用这项新技术并从中最佳获益。
We presented several new algorithms of model checking epistemic logics, and explore their applications in verifications of security protocols.
我们给出了一些新的模型检测算法,并探讨它们在安全协议验证中的应用。
Based on the above work, our research on overlay multicast is performed in the following aspects, which include centralized routing algorithms, distributed routing protocols and system prototype.
在此基础上,我们分别从覆盖多播的集中式路由算法、分布式路由协议和原型系统等几方面开展了研究工作。
Generally, the problem about cryptology comes down to the design and analysis of cipher algorithms and protocols.
密码是网络与信息安全的核心,密码问题一般归结为密码算法与协议的设计与分析问题。
Secure group communication is more complicated than peer to peer communication, and poses a number of challenges ranging from basic algorithms, systems and secure protocols to secure implementation.
相对于端到端的通信,安全群组通信更为复杂,从基本算法、系统及安全协议到安全实现都还存在需解决的问题。
This paper discusses some basic characters of asymmetric watermark, and review some asymmetric watermarking algorithms and asymmetric watermarking protocols.
文章分析了非对称水印的基本特征,并对一些非对称方案,包括非对称水印算法和非对称水印协议进行了讨论。
These routing protocols are divided into single-copy and multiple copy algorithms, which rely on whether to allow data packets in the network is several-fold increase.
这些路由协议分成单复制和多复制算法,这种算法依靠是否允许数据包在网络中被多倍增加。
Methods to express the preparation and measurement of quantum states on current computer and the basic algorithms for simulating the quantum key distribution protocols were given.
给出了在经典计算机上表示量子态的制备和测量方法,并编制相应的程序,实现了多种量子密钥分配协议仿真。
Second existing routing protocols or algorithms are outlined and compared as the classification of plane, hierarchical as well as the position aided ones.
接着概述现有的平面、层次以及位置辅助路由协议或算法并做了必要的分析和比较;
And then time slot allocation algorithms and routing protocols based on directional antenna are designed for IFDL. At last performance of the network is simulated with OPNET.
然后设计、提出了基于定向天线的适用于机间数据链的时隙分配算法及路由协议并利用OPNET仿真软件验证了网络性能。
It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.
密码技术主要包括对称密码算法和非对称密码算法及协议。
Cryptography is the core domain in the information security technique. It provides many algorithms and protocols to meet practical need.
密码学作为信息安全技术的核心领域,提供了多种密码算法与应用协议以满足人们实际应用的需要。
Knowledge of cryptography, include algorithms and protocols.
了解密码学,算法以及协议。
In recent years, a set of watermarking protocols with new mechanisms and algorithms have been proposed by scholars all over the world.
近年来,国内外许多学者提出了一系列新的数字水印协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
The algorithms and protocols are the base of modern information security technology.
这些算法和协议构成了现代信息安全技术的基础。
Theoretical and experimental results demonstrate that the proposed algorithms are able to obtain better performance than those existed protocols.
理论和实验结果证明我们的改进有效地提高了网络的性能。
Theoretical and experimental results demonstrate that the proposed algorithms are able to obtain better performance than those existed protocols.
理论和实验结果证明我们的改进有效地提高了网络的性能。
应用推荐