"We have to get this verification protocol done very soon," he said.
他说:“我们必须很快达成核实细则。”
To see the details of verification points, use the Web Service Protocol Data view, as shown in Figure 33.
要查看验证点的详细信息,使用WebServiceProtocoldata视图,如图33所示。
For the details of a verification point, you'll want to use the Web Service Protocol view.
对于一个验证点的详细情况,您将会使用WebServiceprotocol视图。
Responsible for Test Case integration and Verification of protocol conformance test (PCT) on LTE.
负责LTE的协议一致性的测试用例集成与验证。
The work of this dissertation is to complete the RTL design and verification of CLB-PVCI bus bridge after studying and analyzing the CLB bus protocol and PVCI protocol.
本论文工作就是在研究和分析CLB总线协议和PVCI协议的基础上,完成CLB - PVCI总线桥的RTL设计和验证。
We always use certificate Revocation List to save the revoked certificates, and use Lightweight Directory Access Protocol or Online certificate Status Protocol as verification mechanism.
证书的撤销采用证书撤销列表,而用于验证证书状态的机制一般使用轻型目录存取协议或者在线证书状态协议。
The modeling and verification prove that the interation protocol can satisfy the requirement no matter the network is in normal or abnormal circumstances.
通过对联动协议进行建模和验证,证明联动协议无论在网络正常的情况下还是网络故障时都能满足需求。
It has become more and more important that the application of theorem proving on mathematic theorem proving, protocol verification, hardware verification and software verification.
机器定理证明在数学定理证明、协议验证、软件和硬件的形式化验证等方面发挥出越来越重要的作用。
In order to guarantee the security of OSPF protocol and to reduce its cost as much as possible, a new verification mechanism was proposed.
为了保障OSPF协议的安全,同时尽可能降低其安全方面的开销,提出了一种全新的验证机制。
Finally, the verification result shows that the EAP-AKA protocol can satisfy the mutual authentication between the peer and the EAP server.
验证结果说明,EAP - AKA协议能够满足对等端和EAP服务器间的双向身份认证。
Finally, the verification results of the protocol testing, summary and future work are presented.
最后给出协议测试验证结果及工作总结与展望。
The verification method was presented based on the above correlation property, which had been used to verify the Woo and Lam authentication Protocol in reverse analysis.
从主体认证关联、消息间关联和消息内部关联三个角度去刻画协议,提出了基于以上关联特点的协议验证方法。
Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.
改进的门限代理签密协议利用接收方公钥而不是私钥来验证签密结果,其验证过程能向第三方公开。
On the system verification platform, the function simulation in system level about the pseudo LRU mechanism and MESI protocol is taken, and the results conform to the original intension of our design.
此外,为了验证LRU算法和一致性协议,我们在验证平台上做了相关的系统级功能模拟,逻辑模拟结果和设计初衷是吻合的。
A proved secure protocol for watermark verification based on perfect zero knowledge interactive proof system and bit commitments scheme is proposed.
基于完全零知识交互证明系统和位委托方案,提出了可证明的安全水印认证协议。
They are very useful in protocol verifications. This paper presents some methods of protocol verification and uses KRONOS to verify FDDI to introduce the method of using timed automata.
文章介绍了网络协议验证的几种方法,并以KRONOS验证FDDI 协议为例说明了用时间自动机验证协议的方法。
Design of a protocol is a difficult and error-prone task, thus the use of formal methods that allow for the verification of such protocols has received increasing attention.
设计一个满足安全需求的协议非常困难,并且极易出错,因此利用形式化方法来检验安全协议引起了人们极大的关注。
After initial verification of the label information for the test sample and on the protocol, the protocols are logged into a database.
初步审核测试样品的标签信息和测试协议后,协议将登陆到数据库。
The improved TTS key negotiation protocol, with small calculation cost, makes great progress in key verification, data source authentication and resist inners attack.
改进的TTS密钥协商协议,以很小的计算代价使原tts协议在密钥证实性、源认证和抗同谋破解上有了很大改善。
The security protocol verification is one of the important projects in the domain of network security.
安全协议认证是网络安全领域中重大课题之一。
Finally, it shows the formal verification of the improved protocol and proves its fairness and non-repudiation.
最后对改进后的协议进行形式化分析,证明改进后协议的不可否认性和公平性。
In the model, protocol verification theory is introduced into the system to make up shotcomings of protocol analyzing method.
该模型引入了协议确认模块,在进行模式匹配前对数据进行过滤。
We abstract this as a group of logic rules, which makes it possible to do the verification of the interleaving of infinite sessions of the security protocol.
将安全协议对应的并发合成系统抽象为一组逻辑规则,能够对安全协议无穷会话的交叠运行进行验证。
We abstract this as a group of logic rules, which makes it possible to do the verification of the interleaving of infinite sessions of the security protocol.
将安全协议对应的并发合成系统抽象为一组逻辑规则,能够对安全协议无穷会话的交叠运行进行验证。
应用推荐