This is the old IIOP security protocol.
这是旧的IIOP安全性协议。
E-Commerce security protocol usually adopts SSL and SET protocol.
电子商务中的安全协议主要采用SSL协议和SET协议。
The server is using an unsupported version of the security protocol.
此服务器正在使用一种不支持的安全性协议。
NOTE: it is mandatory for a Writable SD Card to support Security Protocol.
注意:它是可写的SD卡强制性支持的安全协议。
Network security protocol is important factor in computer network security.
网络安全协议模型是计算机网络安全中的重要因素。
The analysis and design of Security Protocol is always complex and error prone.
安全协议的设计和分析是复杂而且容易出错的。
TLS protocol is an important transport layer security protocol, and is widely used.
TLS协议是一种重要的传输层安全协议,得到了广泛的应用。
Formal authentication of security protocol is an important field of network security.
安全协议的形式化验证是网络安全的一个重要领域。
In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.
事实证明,串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
Now the most popular web security protocol is SSL, which can be deployed in the embedded browser.
将SSL协议与嵌入式浏览器相结合即可满足安全数据传输的要求。
The security protocol verification is one of the important projects in the domain of network security.
安全协议认证是网络安全领域中重大课题之一。
The security protocol is found to have bugs or leaks if the logic can not reason out the protocol goal.
如果不能推理出协议的最终目标,说明协议存在缺陷或者漏洞。
Strand Space Model (SSM) is a practical, intuitive and strict formal method for security protocol analysis.
串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
There are many ways proposed to analyze the security protocol, the BAN-like logic is one of the important ways.
人们提出了多种密码协议的分析方法,BAN类逻辑是其中重要的一种。
Information security is composed of security protocol and cryptographic algorithm, the latter is the base and core.
信息安全主要是由安全协议和密码算法组成,其中密码算法是信息安全的基础和核心技术。
For example, a security protocol channel can be layered over HTTP transport channel to provide secure communications over HTTP.
如,可以使用将安全协议信道置于HTTP传输信道之上来提供安全的HTTP传输通信。
SSL (Secure Sockets Layer), a widely used security protocol in the net, can provide security guarantee for Internet communications.
SSL作为互联网上普遍使用的一种安全协议,可以为互联网通信提供安全保障。
So the analysis and design for efficient security protocol is more important research problem in the field of computer communication.
因此,分析、设计安全有效的安全协议是计算机通讯领域中一个极为重要的研究课题。
The main ideas and methods of security protocol design and the PDS are introduced, and presents the derivation of the ISO-9798-3 protocol.
通过介绍目前安全协议设计的主要思路和方法,说明了PDS系统的主要内容和方法,推导出了ISO- 9798 -3协议。
E-commerce security protocol is not only an important way to protect the security of e-commerce, but also the core technology of thee-commerce.
电子商务安全协议是保障电子商务安全性的重要途径,也是电子商务中最核心最关键的技术。
As a protocol level framework of the security Problem Resolve, security protocol keeps on being the hot and difficult point in the security area.
安全协议作为协议级的安全解决框架,始终是安全领域里的热点和难点。
Thirdly, this thesis sets forth a routing security protocol of the wireless sensor networks, and establishes a special clock synchronous protocol.
第三,本论文设计了轻量散投的无线传感器网络安全路由协议;
Protocol analyser can analyse security protocol by the logic, and protocol designer can construct security protocol by the logic in a systematic way.
协议分析者可以用该逻辑来对安全协议进行分析,而协议设计者可以使用该逻辑用一种系统的方法来构造安全协议。
Based on the non repudiation and the security protocol of non repudiation for electronic commerce, this paper introduces a new non repudiation protocol.
针对电子商务安全协议的非否认性,在现有非否认服务的基础上,介绍了一种新型非否认协议。
PAM's architecture is modular, which means it's designed to support the seamless exchange of one security protocol component for another by swapping out modules.
PAM的体系结构是模块化的,这意味着它设计为可以通过交换模块,支持从一个安全协议组件无缝地转换到另一个协议组件。
The strand space model is a very important tool of analyzing security protocol, and it has good semantics, but it is difficult to analyze security protocol.
串空间模型是安全协议分析的一种重要工具,它具有良好的语义,但其分析过程难度较大。
Using formal method to analyze security protocol is a valid method to the analysis of security protocols. In recent years, a lot of formal methods appeared.
采用形式化方法分析安全协议是协议分析的有效手段,近年来,出现了众多的研究方法。
While the former can be accomplished via use of Kerberos (see Resources) and similar network security protocol, the latter requires special administrative tuning.
尽管前者可以通过使用Kerberos (参见参考资料)和类似的网络安全协议完成,但是后者需要特殊的管理调优。
From an application system, this paper analyzes the privacy and authenticity of a security protocol in the electronic fund transfer system with a formal proof method.
从一个实用系统出发,采用形式化的证明方法,分析了电子资金转帐系统中安全协议的保密性和可鉴别性。
From an application system, this paper analyzes the privacy and authenticity of a security protocol in the electronic fund transfer system with a formal proof method.
从一个实用系统出发,采用形式化的证明方法,分析了电子资金转帐系统中安全协议的保密性和可鉴别性。
应用推荐