• Design and implementation approaches for IKE protocols in the security VPN server are studied in this paper.

    研究了安全VPN服务器ike协议设计实现方法

    youdao

  • The key technology of mobile value-added services is to design protocols, which can meet the poor computing power as well as being security.

    移动通信增值服务关键技术之一就是设计满足计算性能又具有良好安全性的协议

    youdao

  • The logic can be used not only to analyze security protocols, but also to design security protocols.

    逻辑不但可以用来分析安全协议而且可以用来设计安全协议。

    youdao

  • However, design of cryptographic protocols is a very micromesh job, because any tiny mistake may damage security of the protocol.

    遗憾加密协议设计非常细致工作任何细小错误都可能会影响到协议的安全功能。

    youdao

  • There exist many logics. Some of them may be only used to analyze security protocols, and the others may be only used to design security protocols.

    现有逻辑有的用于分析安全协议有的则只可用于设计安全协议。

    youdao

  • The design and the security of electronic commerce protocols are keys of their theories and techniques.

    电子商务协议设计安全性成为电子商务核心理论和最关键的技术。

    youdao

  • The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.

    密码协议分析设计基础进行形式化建模

    youdao

  • The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.

    密码协议分析设计基础进行形式化建模

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定