The third protocol, often referred to as hot antibodies, couples 3f8 and radioactive iodine.
第三种方案,常被称作“热抗体”,会采用双倍的3f 8和放射性碘同位素。
The third layer is <wsdl:binding> elements, which associate a particular message protocol (such as SOAP) and access method with a
第 3层是 <wsdl:binding>元素,使用
The third copy happens as the DMA engine passes the data from the kernel socket buffers to the protocol engine.
数据的第三次复制发生在dma引擎将数据从内核套接字缓冲区传到协议引擎时。
One of the benefits of writing your own protocol for TCP communications is that there are no additional third-party libraries that you need to install.
为TCP通信编写您自己的协议的好处之一就是,您无需安装额外的第三方库。
The technique in this article has been successfully applied to a file transfer portlet that makes use of the GridFTP protocol for managing large datasets between two third-party data grid nodes.
本文所探讨的技术已经被成功应用到文件传输portlet,该protlet采用GridFTP协议管理两个第三方数据网格节点之间的大型数据集。
Note that the third authority operation, getAuthorityVersion, is not included in this interface, because the authority version refers to the version of the protocol.
在这里需要注意的是,第三个中心操作,即getAuthorityVersion,并没有包括在这个接口中,因为中心的版本指的是协议的版本。
This binding type integrates with third-party JMS 1.1 providers (that have already been configured in WebSphere) and works in much the same way as the current JMS protocol binding.
此绑定类型与第三方JMS 1.1提供者(已经在WebSphere 中进行了配置)集成,而且其工作方式与当前的 JMS协议绑定非常相似。
In the third installment (see Resources), I showed you how Simple Object Access Protocol (SOAP) works under the hood.
在第3部分(请参阅参考资料)中,我展示了简单对象存取协议(SOAP)如何在后台工作。
Step three: the third copy happens as the DMA engine passes the data from the kernel socket buffers to the protocol engine.
步骤三:dma模块将数据由socket的缓冲区传递给协议引擎时,第3次复制发生。
In the third chapter, we first detail some watermarking attacks including watermark removal attacks, cryptographic attacks and protocol attacks.
在第三章中,我们首先详细介绍了水印去除攻击、密钥攻击及协议攻击。
So we put forward an algorithm of dual concurrent signature and design an electronic payment protocol without the trusted third party (TTP).
通过以上分析研究,本文提出了“双重的同时生效签名”算法,设计了无可信第三方的电子支付协议。
Then the thesis put forward to a kind of security protocol based on trusted third party and a kind of lightweight IP layer security mechanism, and analysed them in details.
然后提出了一种基于可信第三方的安全协议以及一种轻量级IP层的安全机制,对它们进行了详细的分析。
This protocol can realize mutual authentication and generate a session key acknowledged by both sides of communication. Besides, the generation of session key has no third party involved.
该协议可以实现通信双方的相互认证,同时产生双方认可的会话密钥,并且会话密钥的产生不需要其他第三方的参与。
Mental poker is a secure multi-party computation solution in specific scene. In recent years, the studies on mental poker protocol in academe are mainly based on Trusted Third party (TTP).
智力扑克是一种特定场景的安全多方计算,近些年来,学术界对智力扑克协议的研究基本都是基于可信第三方的。
A novel synchronization protocol is presented, giving the extension of third party reference broadcast and concerned with the deployed density of WSN nodes.
在第三方参考广播协议的基础上,提出了一种基于节点密度的时间同步协议。
It is a more efficient and secure protocol, which solves the bottleneck problem of trusted third party.
这个协议解决了可信第三方的性能瓶颈问题,是一个更为有效的、安全的密码协议。
A new fair exchange protocol with semi-trusted third party is proposed on the basis of a new convertible authenticated encryption scheme.
基于一种可转换的认证加密方法,设计出一种新的包含半可信第三方的公平交换协议。
The protocol can be implemented without the participation of the third party and its security was based on additive homomorphic public key cryptosystem.
协议的执行过程中不需要第三方的参与,协议的安全性基于所采用的同态公钥加密算法。
The third service is called FTP (file transfer protocol).
第三种服务叫做FTP(文件传输协议)。
In the third part, basing on the actual requirements of the project, a tree based energy efficient routing protocol TREES is designed.
第三部分根据项目的实际需求,设计了一种基于树型结构网络的能量高效的无线传感器网络路由协议TREES。
A perfect digital-watermarking protocol can prevent illegal distribution of digital products and avoid false-accusation to an honest buyer without the third part authorization.
好的数字水印协议可以防止数字产品的非法传播,并且在不需要第三方公证的情况下可防止对诚实用户的误指控。
Solving the third problem is often related to network-layer protocol considerations because the act of supplying a new IP address depends on being able to prove that one is authorized to receive it.
解决第三个问题是往往涉及到收集层和谈的考虑,因为新的IP地址供给一个能够采纳步履来证实,一个是授权领受的抉择。
Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.
改进的门限代理签密协议利用接收方公钥而不是私钥来验证签密结果,其验证过程能向第三方公开。
Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.
改进的门限代理签密协议利用接收方公钥而不是私钥来验证签密结果,其验证过程能向第三方公开。
应用推荐