In the security analysis, we presented two hard problems over elliptic curves as well.
在对方案的安全性分析中,我们还提出了两类椭圆曲线上的困难问题。
The security analysis of the network file service system is able to validate the security of model.
通过对网络文件服务系统的安全性分析,验证了该模型的安全性。
Finally, we give a simple security analysis of the protocol to show that it fulfils these requirements.
最后,对该协议进行了简要的安全分析,证明它能够满足这些安全要求。
The copy of Security Analysis that I keep in my library and that I used at Columbia is the 1940 edition.
余书室所藏之《证券分析》印本,与余于哥伦比亚大学所用印本,均为1940版。
The security analysis of the new scheme shows that it can resist all kind of outsider and insider attacks.
安全分析表明它能抵抗各种内部和外部攻击,是一种安全的多重签名方案。
Its result indicates that causality diagram is more effective than FTA in security analysis and assessment.
结果表明因果图方法可以有效地进行安全分析和安全评估,而且比故障树分析法效果好。
Assist to complete each promotion of financial product, and participate in making the security analysis report.
协助完成各项金融产品的推广,并参与完成证券分析报告。
This paper introduces the MD5 algorithm and security analysis. A new keyed hash algorithm based on MD5 is proposed.
介绍了MD 5算法及对它的安全性能分析,提出了一个基于MD5的键控散列算法。
Secondly, it introduces requirement analysis , functional analysis of all modules, security analysis of the system.
然后介绍了系统的需求分析,系统各模块的功能分析以及系统安全性分析等。
Through the security analysis, the model has settled users' bestriding problem yet still achieved security property.
安全分析表明,在解决用户跨步问题的前提下,没有降低模型的安全性。
In some ways his new book, "Slow Finance", is in the tradition of Benjamin Graham, the founder of modern security analysis.
他的新书《迟缓的金融》在某种程度上完全承袭了本杰明·格雷厄姆,现代安全分析的创始人。
This measure method supplies reliable data for security analysis and designing installed flange of steam turbine 's vane.
此项技术可为汽轮机叶片安装轮缘的设计和安全性分析提供可靠依据。
The research shows that extension set and correlation degree analysis is the utility method of network security analysis and control.
研究表明,可拓集与关联度分析是网络安全分析与控制的有效工具。
The proposed method is also suitable for the security analysis of reactive power correction in large-scale interconnected power systems.
本方法也适用于大型互联电力系统的无功校正安全分析。
Experiment result is significant for safe operation of nuclear heating reactor and security analysis program to confirm small break LOCA.
实验结果对核供热堆的安全运行及验证小破口事故安全分析程序有重要意义。
As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.
随着信息技术安全问题的日益突出,对网络系统进行安全分析日益重要。
Security analysis and market analysis are alike, therefore, in the fact that they deal with data that are not conclusive as to the future.
价值派和技术派与此类似,都是根据历史数据来判断并不绝对相同的未来。
The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。
The research of security analysis needed a systemic security analysis model that was from the system resource and security factor of computer network.
安全性分析研究工作需要把计算机网络与安全相关的系统资源和安全因素抽取出来建立一种面向安全性分析的安全模型。
It's certainly better to use TLS than inventing your own solution. Additionally, you'll benefit from a protocol that has withstood careful security analysis.
使用TLS肯定比你自己发明解决方案要好,另外,使用经得起仔细的安全分析的协议,你能从中获益。
This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.
本文提出面向消息中间件的分布式认证协议,给出协议内容、形式化描述以及安全性分析。
The focus is on open source technologies, but there are also mentors for Secure software's CodeAssure product line for automated security analysis of software.
集中在开源技术上,而不是检查安全软件的代码保证产品线。
In order to run IP on an ATM-based network, new protocols are developed. However, these protocols have not yet been subjected to a thorough security analysis.
为了在AT M网上实现IP传输,人们提出了一些新的协议,但这些协议本身的安全性还没有进行深入地了解和验证。
The experiment results show that, content-security analysis in CIPS can effectively block junk email, prevent network virus and sift banned content in real time.
实验表明,CIPS中网络内容安全分析能够阻塞垃圾邮件、防御网络病毒、过滤违禁内容。
This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.
本文提出一种基于信息系统安全性分析来定量计算信息安全风险的度量尺度,差距分析方法及相应的评估流程。
Cui Guohua, Male, born in 1947, Professor, Supervisor of PhD Candidates. Main research: access control, the security analysis of cryptosystem, algebra number theory.
崔国华(通讯作者),男,1947年生,教授,博士生导师。主要研究方向:访问控制,密码体制的安全性分析,代数数论。
In static security analysis, the principal methods for static N-1 branch outage simulation include DC power method, compensation method and sensitivity analysis method.
在电力系统静态安全分析中,静态N - 1支路开断模拟的主要分析方法有直流潮流法、补偿法以及灵敏度分析法等。
To eliminate the original signers forgery attacks, a modification of the proxy key generation stage is proposed. Security analysis of the improved scheme is also presented.
为了抵抗原始签名人的伪造攻击,改进了代理签名密钥的生成过程,并对改进的方案进行了安全性分析。
The CLASP process also introduces a few new artifacts that logically result from security analysis. These artifacts are fully documented, with supporting examples and templates.
CLASP过程也介绍了一些新的活动,这些工件是完全文档化的,支持样例和模板。
The CLASP process also introduces a few new artifacts that logically result from security analysis. These artifacts are fully documented, with supporting examples and templates.
CLASP过程也介绍了一些新的活动,这些工件是完全文档化的,支持样例和模板。
应用推荐