The analysis of security shows that it is a weak proxy signature scheme and does not belong to a strong proxy signature scheme.
安全分析表明它是一种弱代理签名方案,不属于强代理签名。
Using formal method to analyze security protocol is a valid method to the analysis of security protocols. In recent years, a lot of formal methods appeared.
采用形式化方法分析安全协议是协议分析的有效手段,近年来,出现了众多的研究方法。
The analysis of security for the cryptography demonstrates the cryptography can resist the message replay attacks and man in the middle attacks, and is feasible in practice.
对该密码安全体制进行安全分析后表明:该体制能有效地抵御网络中的消息重放攻击和中间人攻击,并在实际应用中有较高的可行性。
This paper first introduces principles of synchronous and asynchronous identification based on time and events, and then gives a through analysis of security in dynamic identification techniques.
简要介绍基于时间、基于事件同步、非同步认证原理,分析了动态认证技术安全性。
It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
Centralizing the implementation of security policies, log analysis and reporting is a good thing.
安全策略、日志分析与报告的中心化实现是个不错的主义。
The sheer amount of data makes the storage, retrieval, and understanding of this information very difficult without a properly designed security event gathering and analysis architecture.
如果没有完善设计的安全性事件收集和分析架构,存储、检索和理解这样巨大的信息量是非常困难的。
In our previous column, we discussed software security analysis at a high level, introduced a methodology for assessing software security, and explained the key characteristics of a risk analysis.
在上一专栏中,我们从较高层次讨论了软体安全性的分析,介绍了软体安全性的方法,并且说明了风险分析的关键特性。
In some ways his new book, "Slow Finance", is in the tradition of Benjamin Graham, the founder of modern security analysis.
他的新书《迟缓的金融》在某种程度上完全承袭了本杰明·格雷厄姆,现代安全分析的创始人。
It is designed to handle the growing demands of enterprise security architecture by using updated cutting-edge analysis and correlation features that were not present in the previous products.
它是专门通过使用最新的前缘分析和相关性分析特性来处理快速增长的企业安全性架构需求,而这些特性是以前的产品所不具备的。
Security is a multi-faceted problem that requires close analysis of all the vulnerable factors in a business infrastructure.
安全是一个涉及多方面的问题,需要对业务基础设施中所有容易受到危害的因素加以分析。
Analysis of the security logs can detect patterns of suspicious behavior, allowing the administrator to take action.
安全日志的分析可以检测可疑行为,并且允许管理员采取行动。
He has very strong expertise in UNIX administration and security solutions, with applied knowledge of CRM, profitability analysis, campaign management, EIS, and ETL processing.
他在Unix管理和安全解决方案方面有很强的专业能力、具备应用CRM知识、赢利分析、营销活动管理、EIS 和ETL过程方面的知识。
The focus is on open source technologies, but there are also mentors for Secure software's CodeAssure product line for automated security analysis of software.
集中在开源技术上,而不是检查安全软件的代码保证产品线。
Security analysts are often called white hats, and white-hat analysis is the use of hacking for defensive purposes.
安全分析师通常称为白帽(white hat), 白帽分析是为防御目的而使用的密码破解。
Thus begins a studious and academic analysis of the fun, happy, bouncy, up-beat song "Lookin 'Out My Back Door" as it applies to the topic of Web security.
因此,我们首先从适用于Web安全性主题的方面入手,对有趣、愉快、活泼、乐观的歌曲“小心我的后门(LookinOut My Back Door)”进行认真的学术分析。
For Web applications, the most important type of security static analysis is called taint flow analysis.
对于Web应用程序,安全静态分析最重要的类型叫做污染流分析。
The Internet cookie Report page of the Security Space Web site offers some frequency analysis through associating the cookie names with the server that issues them.
SecuritySpaceWeb网站的InternetcookieReport网页通过将这些cookie的名称和发行它们的服务器联合起来,从而提供了一些频率分析。
Federal employees' job security is so great that workers in many agencies are more likely to die of natural causes than get laid off or fired, a USA TODAY analysis finds.
《今日美国》的一项调查发现,联邦雇员的工作保障率如此之高,以至于在许多机构,员工被解雇的几率比自然死亡的几率还低。
Risk analysis is a method of identifying risks and assessing potential damages that could occur to justify security controls and safeguards.
风险分析是一种标识风险和评估可能会出现的潜在损失的方法,用于为安全控制和保障措施提供依据。
So the analysis and design for efficient security protocol is more important research problem in the field of computer communication.
因此,分析、设计安全有效的安全协议是计算机通讯领域中一个极为重要的研究课题。
The latest is voice risk analysis (VRA), which, among others, Harrow Council in London is testing [font=Arial]as a way of identifying fraudulent claims for social-security benefits[font=Arial].
声音危险性分析(VRA)是最近的技术发明。 和其他此类发明一样,[font=Arial]伦敦的Harrow理事会正在测试一种对社会安全有利的测试说谎的方法[font=Arial]。
Power system security and stability analysis is necessary to the security and stability operation of power systems.
电力系统安全稳定分析是保障电网安全稳定运行的重要环节。
On the basis of analysis of connotation of oil import security and the current situation of Chinese oil import, this paper put forward some security problems in Chinese oil import.
文章在对石油进口安全的内涵及中国石油进口现状进行分析的基础上,指出了中国石油进口中存在的一些安全问题。
Based on analysis of transaction security, a secure transaction model is given. Moreover, a correctness criterion for secure transactions, secure conflict serializability (SCSR) is proposed.
在对事务安全性分析的基础上提出了安全事务模型和安全事务正确性标准-安全冲突可串行化(SCSR)。
AmberPoint saw it as autodiscovery of dependencies and “rogue services”, light-weight security, monitoring and end-to-end fault analysis.
AmberPoint将SOA治理看成一种自动发现依赖关系及“流氓服务”的机制,以及一种轻量级安全、监控和端到端错误分析的机制。
In this paper, a deep analysis was made from five angles on the design of China's social security tax system based on the traditional four-principle rule.
本文在分析我国社会保障税制设计应遵循四个原则的基础上,就该税制要素设计的五个重要方面问题进行了详细研讨。
As an essential part in the power system security analysis, the whole process of contingency selection becomes more sensible by taking the probability aspect into consideration.
作为电力系统安全分析中的重要组成部分,偶然事故的选择由于在分析过程中加入了对事故发生率的考虑而变得更具有合理性。
Digital library of the University analysis of the threat to network security, made a series of network security management strategy.
通过对高校数字图书馆的网络安全面临的威胁进行分析,提出了一系列的网络安全管理策略。
Digital library of the University analysis of the threat to network security, made a series of network security management strategy.
通过对高校数字图书馆的网络安全面临的威胁进行分析,提出了一系列的网络安全管理策略。
应用推荐