• In addition, this model USES the protocol analysis technology.

    模型采用协议分析技术

    youdao

  • The network protocol analysis is an essential technique in network intrusion detection.

    网络协议分析网络入侵检测中的一项关键技术

    youdao

  • The application of the protocol analysis technology in IDS is also discussed in this paper.

    协议分析技术IDS中的应用进行讨论。

    youdao

  • The analysis and design of Security Protocol is always complex and error prone.

    安全协议设计分析复杂而且容易出错的。

    youdao

  • Analysis results show that it is a secure protocol and more efficient than other protocols.

    分析表明协议安全的,并且协商效率优于现有协议。

    youdao

  • Performance analysis and testing of RTCC protocol.

    RTCC协议性能分析测试

    youdao

  • Theory analysis shows that the protocol is secure.

    从理论上分析协议安全的。

    youdao

  • Strand space model is a new formal analysis tool to the analysis of cryptogram protocol.

    空间模型一种新兴密码协议形式化分析工具

    youdao

  • On the analysis of BAN-logic and some possible attacks, the protocol is secure.

    通过BAN逻辑及各种可能攻击分析证明协议是安全的。

    youdao

  • Theory analysis shows that this kind of key code distribution's protocol is absolutely safe.

    理论分析表明这种密钥分配协议安全可靠

    youdao

  • By BAN logic analysis, the security of this new protocol is proved.

    通过BAN逻辑分析证明了改进协议安全性

    youdao

  • Theory analysis shows that this kind of key distribution's protocol is absolutely safe.

    理论分析证明这种密钥分配方案绝对安全

    youdao

  • Recently, analysis and improvement of IKE protocol has become a hotspot in network security area.

    近年来IKE协议分析改进成为网络安全领域的一个研究热点。

    youdao

  • The performance analysis results show that this protocol can resist many common attacks.

    分析表明抵抗多数常见攻击

    youdao

  • The performance analysis results show that this protocol can resist many common attacks.

    分析表明抵抗多数常见攻击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定