查电话号码 繁體版 English Francais日本語ไทย
登录 注册

secure protocol造句

"secure protocol"是什么意思  
造句与例句手机版
  • Secure protocols and technology for online payment in electronic commerce
    电子商务中在线支付的安全协议和技术
  • In your browser , you can tell when you are using a secure protocol , such as tls , in a couple of different ways
    在用户的浏览器中用户可以有许多不同的方式知道何时使用了如tls之类的安全协议。
  • With windows 2000 server , you can use several new , more secure protocols for creating virtual private networks , including
    利用windows2000server ,可以用以下几个新型、更安全的协议创建虚拟专用网络,这些协议是:
  • At its inception , dns was not designed to be a secure protocol . because of its vulnerability , dns faces many threats from a variety of aspects
    Dns协议在设计之初就没有考虑太多的安全因素,协议本身所存在的脆弱性使得dns面临着各种威胁。
  • Ssl protocol is one of the most famous secure protocols . it belongs to the session layer , and plays an important role in the internet
    Ssl协议隶属于会话层,处于有连接的会话层( tcp )之上,它一经产生就在internet领域发挥了它的巨大作用。
  • Presently , many of the famous commercial products of browsers and web servers support ssl internally . ssl has become the most prevailing www secure protocol
    目前,国外著名的商用浏览器和web服务器都内嵌地支持ssl协议, ssl己成为最流行的www安全协议。
  • The ssl protocol developed by netscape communications is a famous secure protocol in data transmission process , which is widely applicable in communication security
    Ssl协议是由netscape公司研究制定的安全数据传输协议,该协议被广泛应用于安全数据传输与互连网交易中。
  • Ipsec protocol suite is a general - purpose secure protocol for internet . tightly integrated with ip protocol , it can provide various secure services for traffic at the ip layer
    Ipsec协议集是一个与ip协议栈紧密结合的通用的安全协议,可以为ip层和ip层以上的数据传输提供统一的安全保障和安全服务。
  • Entirely analyzed the secure protocols in www especially to ssl protocol . finished the protocol coherence test etc . it was proved to be viable through the practical testing process
    全面分析了www安全协议的现状,重点研究了ssl协议,并对该类产品所采用协议一致性等项目进行测试,在实际测试中证明该方法是可行的。
  • The theoretical contributions of this paper are that the author analyzes the bottom layer of the protocol , pointed out the elliptical curve and secondary encryption in rsa based on common used secure protocols
    本文的理论贡献是在分析常用的信息技术安全协议的基础上,分析了网络底层的安全协议,提出了椭圆曲线在密钥交换和对rsa进行指数二次加密的解决方案。
  • It's difficult to see secure protocol in a sentence. 用secure protocol造句挺难的
  • The topics covered in this course include interactive proofs , zero - knowledge proofs , zero - knowledge proofs of knowledge , non - interactive zero - knowledge proofs , secure protocols , two - party secure computation , multiparty secure computation , and chosen - ciphertext security
    本课程所涵盖的主题包含有互动式证明,零知识证明,知识的零知识证明,非互动式零知识证明,安全协定,双方安全计算,多方安全计算与选择密文安全性。
  • However , most of the electronic business secure protocols are subject to the limitation of export regulations . for example , only 40 bits or 56 bits of rc4 algorithm and 512 bits of rsa algorithm are permitted to export , and its source code is n ' t published
    但是,国外主流的电子商务安全协议在核心密码算法上都有出口限制,如只允许40位或56位的rc4和512位的rsa算法出口等,而且协议源代码不公开,根本无法满足我国电子商务实际应用当中的安全需求。
  • This thesis focuses on applying cryptographic principles and secure protocols to make software components in pki system . the goal is that programmers can develop secure application system with the components , but they don " t require to comprehend the algorithm and protocol details
    本课题研究的重点在于对pki中常用的密码学算法和安全协议的实现进行构件化,目标是使程序员在不需了解算法和协议细节的情况下能够使用本课题的研究成果进行安全应用的开发。
  • This platform utilizes several techniques , including cryptographic algorithms , one - way hash function , digital certification , secure protocol , watermarkng and etc . based on this platform , a new authentication and key exchange protocol is presented and has been well applied to this transmission platform
    该传输平台使用了多项技术,包括密钥算法、单项散列函数、数字证书、安全协议和数字水印等技术。针对该传输平台,提出了一个新的认证和密钥交换协议,并在传输平台得到了很好的应用。
  • According to some kinds of existed attacking methods that are aimed at the web system , the article discusses the feasibility to implement secure transmission tunnel on every layer in tcp / ip protocol , and the related secure protocol standard . and focusing on cryptography , the paper lucubrates the technology of secure transmission of information such as data encryption , digital signature , identity authentication and data integrality technology
    本文针对web系统中信息传输所面临的安全威胁,从保障网络信息安全传输的角度,系统研究了tcp ip各个层次上实现安全通道的可行性及相关的安全协议标准,围绕密码体制,对数据加密、数字签名、身份认证、数据完整性控制等信息安全传输技术进行了深入的探讨。
如何用secure protocol造句,用secure protocol造句secure protocol in a sentence, 用secure protocol造句和secure protocol的例句由查查汉语词典提供,版权所有违者必究。