Both the symmetric key systems and public key systems currently used are based on the model of computational security.
目前的密钥系统无论是单钥体制还是公钥体制都建立在计算安全的模型上。
The proposed group key establishment scheme reduces both the computational overhead and communication costs and has the high security and usability.
提出的组密钥建立方案有效地降低了组密钥建立过程的计算和通信开销,并具有较高的安全性和可用性。
The scheme is characterized by high security, small computational complexity, and small amount of information that should be kept. The scheme is relatively efficient.
整个方案安全性高,涉及计算复杂度小,需保存信息少,因而效率高且实用。
The ultimate goal of the project is to provide foundations to help transform security engineering into a theory-based computational discipline.
这项计划的最终目标是为将软件安全工程转化为基于理论的计算性学科提供必要的基础支持。
The scheme is characterized by a high security, a small computational complexity, and small amount of information that should be kept. So the scheme is relatively...
整个方案安全性高、涉及计算复杂度小、需保存信息量少,因而效率较高。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性在很大程度上取决于暴力破解的不可行性。
The results of security analysis and efficiency analysis show that the new protocol realizes the secure communications under the low computational cost.
安全性分析和性能分析显示,新协议以较低的代价实现了通信双方的安全通信。
The results of security analysis and efficiency analysis show that the new protocol realizes the secure communications under the low computational cost.
安全性分析和性能分析显示,新协议以较低的代价实现了通信双方的安全通信。
应用推荐