• In the security analysis, we presented two hard problems over elliptic curves as well.

    方案的安全性分析中,我们还提出了椭圆曲线上的困难问题

    youdao

  • The security analysis of the network file service system is able to validate the security of model.

    通过网络文件服务系统安全性分析验证模型的安全性。

    youdao

  • Finally, we give a simple security analysis of the protocol to show that it fulfils these requirements.

    最后协议进行了简要安全分析证明能够满足这些安全要求。

    youdao

  • The copy of Security Analysis that I keep in my library and that I used at Columbia is the 1940 edition.

    书室所藏之《证券分析》印本,哥伦比亚大学所用印本,均1940

    youdao

  • The security analysis of the new scheme shows that it can resist all kind of outsider and insider attacks.

    安全分析表明抵抗各种内部外部攻击,是一种安全多重签名方案

    youdao

  • Its result indicates that causality diagram is more effective than FTA in security analysis and assessment.

    结果表明因果方法可以有效地进行安全分析安全评估而且故障树分析法效果好

    youdao

  • Assist to complete each promotion of financial product, and participate in making the security analysis report.

    协助完成各项金融产品推广参与完成证券分析报告。

    youdao

  • This paper introduces the MD5 algorithm and security analysis. A new keyed hash algorithm based on MD5 is proposed.

    介绍MD 5算法对它的安全性能分析,提出了基于MD5键控散列算法。

    youdao

  • Secondly, it introduces requirement analysis , functional analysis of all modules, security analysis of the system.

    然后介绍了系统需求分析,系统模块的功能分析以及系统安全性分析等。

    youdao

  • Through the security analysis, the model has settled users' bestriding problem yet still achieved security property.

    安全分析表明,解决用户跨步问题的前提下,没有降低模型安全性

    youdao

  • In some ways his new book, "Slow Finance", is in the tradition of Benjamin Graham, the founder of modern security analysis.

    新书迟缓金融某种程度完全承袭本杰明·格雷厄姆现代安全分析创始人

    youdao

  • This measure method supplies reliable data for security analysis and designing installed flange of steam turbine 's vane.

    此项技术可汽轮机叶片安装轮缘设计安全性分析提供可靠依据。

    youdao

  • The research shows that extension set and correlation degree analysis is the utility method of network security analysis and control.

    研究表明可拓关联度分析网络安全分析与控制有效工具

    youdao

  • The proposed method is also suitable for the security analysis of reactive power correction in large-scale interconnected power systems.

    方法适用大型互联电力系统校正安全分析

    youdao

  • Experiment result is significant for safe operation of nuclear heating reactor and security analysis program to confirm small break LOCA.

    实验结果供热安全运行验证破口事故安全分析程序重要意义。

    youdao

  • As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.

    随着信息技术安全问题日益突出网络系统进行安全分析日益重要

    youdao

  • Security analysis and market analysis are alike, therefore, in the fact that they deal with data that are not conclusive as to the future.

    价值派技术派类似,是根据历史数据判断并不绝对相同未来。

    youdao

  • The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.

    针对计算机系统安全故障方法网络信息系统攻击方法应用了这一安全分析建模工作。

    youdao

  • The research of security analysis needed a systemic security analysis model that was from the system resource and security factor of computer network.

    安全性分析研究工作需要计算机网络安全相关系统资源安全因素抽取出来建立一种面向安全性分析的安全模型

    youdao

  • It's certainly better to use TLS than inventing your own solution. Additionally, you'll benefit from a protocol that has withstood careful security analysis.

    使用TLS肯定自己发明解决方案要好另外,使用经得起仔细安全分析的协议从中获益

    youdao

  • This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.

    本文提出面向消息中间件的分布式认证协议给出协议内容形式化描述以及安全性分析。

    youdao

  • The focus is on open source technologies, but there are also mentors for Secure software's CodeAssure product line for automated security analysis of software.

    集中开源技术上,不是检查安全软件代码保证产品线

    youdao

  • In order to run IP on an ATM-based network, new protocols are developed. However, these protocols have not yet been subjected to a thorough security analysis.

    为了AT M网上实现IP传输,人们提出了一些新的协议这些协议本身的安全性没有进行深入地了解和验证。

    youdao

  • The experiment results show that, content-security analysis in CIPS can effectively block junk email, prevent network virus and sift banned content in real time.

    实验表明CIPS网络内容安全分析能够阻塞垃圾邮件、防御网络病毒过滤违禁内容。

    youdao

  • This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.

    本文提出一种基于信息系统安全性分析来定量计算信息安全风险度量尺度差距分析方法相应评估流程

    youdao

  • Cui Guohua, Male, born in 1947, Professor, Supervisor of PhD Candidates. Main research: access control, the security analysis of cryptosystem, algebra number theory.

    崔国华(通讯作者),,1947年教授博士生导师主要研究方向访问控制密码体制安全性分析代数数论。

    youdao

  • In static security analysis, the principal methods for static N-1 branch outage simulation include DC power method, compensation method and sensitivity analysis method.

    电力系统静态安全分析中,静态N - 1支路开断模拟主要分析方法直流潮流补偿以及灵敏度分析法等。

    youdao

  • To eliminate the original signers forgery attacks, a modification of the proxy key generation stage is proposed. Security analysis of the improved scheme is also presented.

    为了抵抗原始签名伪造攻击改进代理签名密钥生成过程,改进方案进行了安全性分析

    youdao

  • The CLASP process also introduces a few new artifacts that logically result from security analysis. These artifacts are fully documented, with supporting examples and templates.

    CLASP过程介绍一些新的活动,这些工件完全文档化的,支持样例模板。

    youdao

  • The CLASP process also introduces a few new artifacts that logically result from security analysis. These artifacts are fully documented, with supporting examples and templates.

    CLASP过程介绍一些新的活动,这些工件完全文档化的,支持样例模板。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定