• The third protocol, often referred to as hot antibodies, couples 3f8 and radioactive iodine.

    第三方案被称作“抗体”,会采用双倍的3f 8放射性碘同位素

    youdao

  • The third layer is <wsdl:binding> elements, which associate a particular message protocol (such as SOAP) and access method with a portType>.

    第 3 <wsdl:binding>元素使用 portType> 将一个特定消息协议访问方法联系到一起。

    youdao

  • The third copy happens as the DMA engine passes the data from the kernel socket buffers to the protocol engine.

    数据第三复制发生在dma引擎数据内核套接字缓冲区传到协议引擎时。

    youdao

  • One of the benefits of writing your own protocol for TCP communications is that there are no additional third-party libraries that you need to install.

    TCP通信编写自己协议好处之一就是无需安装额外第三方

    youdao

  • The technique in this article has been successfully applied to a file transfer portlet that makes use of the GridFTP protocol for managing large datasets between two third-party data grid nodes.

    本文探讨的技术已经成功应用文件传输portlet,该protlet采用GridFTP协议管理两个第三方数据网格节点之间大型数据集。

    youdao

  • Note that the third authority operation, getAuthorityVersion, is not included in this interface, because the authority version refers to the version of the protocol.

    这里需要注意第三个中心操作,即getAuthorityVersion,并没有包括这个接口中,因为中心的版本的是协议版本。

    youdao

  • This binding type integrates with third-party JMS 1.1 providers (that have already been configured in WebSphere) and works in much the same way as the current JMS protocol binding.

    绑定类型第三方JMS 1.1提供者已经WebSphere 中进行配置)集成而且其工作方式当前的 JMS协议绑定非常相似

    youdao

  • In the third installment (see Resources), I showed you how Simple Object Access Protocol (SOAP) works under the hood.

    第3部分(请参阅参考资料)中,展示了简单对象存取协议(SOAP)如何后台工作

    youdao

  • Step three: the third copy happens as the DMA engine passes the data from the kernel socket buffers to the protocol engine.

    步骤dma模块将数据socket缓冲区传递给协议引擎时,第3次复制发生

    youdao

  • In the third chapter, we first detail some watermarking attacks including watermark removal attacks, cryptographic attacks and protocol attacks.

    第三章中我们首先详细介绍了水印去除攻击密钥攻击协议攻击。

    youdao

  • So we put forward an algorithm of dual concurrent signature and design an electronic payment protocol without the trusted third party (TTP).

    通过以上分析研究,本文提出了“双重同时生效签名”算法设计了无可信第三电子支付协议

    youdao

  • Then the thesis put forward to a kind of security protocol based on trusted third party and a kind of lightweight IP layer security mechanism, and analysed them in details.

    然后提出基于可信第三安全协议以及一种轻量级IP的安全机制,对它们进行了详细分析

    youdao

  • This protocol can realize mutual authentication and generate a session key acknowledged by both sides of communication. Besides, the generation of session key has no third party involved.

    协议可以实现通信双方相互认证,同时产生双方认可会话密钥并且会话密钥的产生需要其他第三的参与。

    youdao

  • Mental poker is a secure multi-party computation solution in specific scene. In recent years, the studies on mental poker protocol in academe are mainly based on Trusted Third party (TTP).

    智力扑克一种特定场景的安全多方计算近些年来,学术界智力扑克协议研究基本都是基于可信第三的。

    youdao

  • A novel synchronization protocol is presented, giving the extension of third party reference broadcast and concerned with the deployed density of WSN nodes.

    第三参考广播协议基础上,提出了基于节点密度时间同步协议

    youdao

  • It is a more efficient and secure protocol, which solves the bottleneck problem of trusted third party.

    这个协议解决可信第三性能瓶颈问题一个更为有效的安全的密码协议。

    youdao

  • A new fair exchange protocol with semi-trusted third party is proposed on the basis of a new convertible authenticated encryption scheme.

    基于可转换认证加密方法,设计出一种新的包含半可信第三公平交换协议

    youdao

  • The protocol can be implemented without the participation of the third party and its security was based on additive homomorphic public key cryptosystem.

    协议执行过程中不需要第三参与,协议的安全性基于所采用的同态公钥加密算法

    youdao

  • The third service is called FTP (file transfer protocol).

    第三服务叫做FTP(文件传输协议)。

    youdao

  • In the third part, basing on the actual requirements of the project, a tree based energy efficient routing protocol TREES is designed.

    第三部分根据项目实际需求,设计了一种基于树型结构网络的能量高效的无线传感器网络路由协议TREES

    youdao

  • A perfect digital-watermarking protocol can prevent illegal distribution of digital products and avoid false-accusation to an honest buyer without the third part authorization.

    好的数字水印协议可以防止数字产品非法传播,并且在需要第三公证的情况下可防止诚实用户的误指控。

    youdao

  • Solving the third problem is often related to network-layer protocol considerations because the act of supplying a new IP address depends on being able to prove that one is authorized to receive it.

    解决第三问题往往涉及收集层和谈考虑因为新的IP地址供给能够采纳步履证实个是授权领受抉择。

    youdao

  • Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.

    改进门限代理协议利用接收方公钥不是验证签密结果验证过程第三公开

    youdao

  • Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.

    改进门限代理协议利用接收方公钥不是验证签密结果验证过程第三公开

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定