• This system adopted SET protocol as the basic flow frame of the payment system to ensure the system high security.

    系统采用SET协议作为电子支付基本流程框架保证系统具有高度安全性;

    youdao

  • To increase the security and the expansionary of the system, it uses SIP as a core protocol.

    增加系统安全性扩展性采用下一代互联网络核心协议SIP作为控制信令协议。

    youdao

  • From an application system, this paper analyzes the privacy and authenticity of a security protocol in the electronic fund transfer system with a formal proof method.

    一个实用系统出发采用形式化的证明方法,分析了电子资金转帐系统安全协议保密性可鉴别性。

    youdao

  • In the detail implementation, several techniques are adopted to insure the system security, including TLS protocol and a Local Application Service Token creation method.

    具体实现上,采用多种技术保证系统安全性包括TLS协议本地应用服务令牌生成方法等。

    youdao

  • The system USES a dual-factor authentication method and a digital certificate authentication protocol during the process of authentication, which strengthens the security of the system effectively.

    认证过程,本系统采用因素认证方法数字证书强认证协议有效增强系统安全性

    youdao

  • This paper follows the RADIUS authentication protocol, J2EE and CORBA system standard specifications, according to the distributed, scalability and security requirements for the designed system.

    本文遵循RADIUS认证协议J2EE技术规范CORBA体系规范,根据分布式扩展性安全性要求设计系统。

    youdao

  • Encryption technology, security system and security protocols are the major supports for present business transaction, while security protocol usually adopts SSL and SET protocol.

    商务交易安全主要通过加密技术、安全机制、安全协议进行保证的。电子商务中的安全协议主要采用SSL协议SET协议。

    youdao

  • This paper mainly focuses on key exchange protocol based on dynamic password authentication, which can insure the security of both authentication and transportation of VPN system.

    本文主要研究基于动态口令认证密钥交换协议协议保证VPN的认证安全,又能保证VPN的传输安全。

    youdao

  • Tests basing on the modules of detection system constructed in this thesis show that the expected security, flexibility and effectiveness are achieved in the protocol.

    通过构建检测系统模块测试,可以看到该协议确实达到了预期目的:安全性灵活性有效性

    youdao

  • The details of each protocol in our new E-cash system are described thoroughly. In addition, the security proofs and efficiency analysis...

    本文详细描述了系统各个协议,并给出了相应安全性证明效率分析

    youdao

  • On the basis of discussing above, a security multicast system model based on GDOI Protocol is proposed. The design idea is described and the main data structures and source programs are provided.

    前面讨论基础上,在组成员方提出一个基于GDOI协议安全主机结构模型描述了各个模块的设计思想给出主要数据结构程序

    youdao

  • The details of each protocol in our new E-cash system are described thoroughly. In addition, the security proofs and efficiency analysis are given in...

    本文详细描述了系统各个协议,并给出了相应安全性证明效率分析

    youdao

  • The component, work protocol and security feature of the proposed sys-tem are described by full discussion. Finally a application case of the system is illustrated.

    设计分析系统组成和结构模块后提出系统安全性进行讨论最后实例方案应用实施进行说明。

    youdao

  • Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.

    无线异构网络中的关键安全技术包括安全路由协议接入认证技术入侵检测技术节点协作通信

    youdao

  • Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.

    无线异构网络中的关键安全技术包括安全路由协议接入认证技术入侵检测技术节点协作通信

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定