您要查找的是不是:
- Finally , we give a simple security analysis of the protocol to show that it fulfils these requirements . 最后,对该协议进行了简要的安全分析,证明它能够满足这些安全要求。
- We perform a security analysis and heuristically argue that the protocol obtains all desired security attributes. 随后,我们提出了第一个无证书三方密钥协商协议。
- Visual modelizaton and XML was used to build a thermo-hydraulics security analysis model library for RELAP5 programme. 摘要采用可视化建模技术及可扩展标记语言(XML),建立适用于热工水力安全分析系统程序RELAP5的组件模型库。
- When she arrived at Wharton, we had a desperate need for someone to teach a class in “Security Analysis”. 非但如此,作为扬州人的夏一红,皮肤黝黑,面容娇丽,还有“黑里俏”之誉。
- The paper provides An integrated direct method for power system dynamic security analysis, i.e., the PEBS/BCU method, is put forward in this paper. 提出一种用于电力系统动态安全分析的综合直接法,即 P E B S/ B C U 方法。
- Is the Graham and Dodd "look for values with a significant margin of safety relative to prices" approach to security analysis out of date? 格雷厄姆与多德追求“价值远超过价格的安全保障”,这种证券分析方法是否已经过时?目前许多撰写教科书的教授认为如此。
- The security analysis makes it clear that this scheme has the characters of uniqueness, irreversibility and undeniableness. 安全性分析表明,此方案具有需要的唯一性、不可篡改性和不可否认性等特性。
- Through the security analysis,the scheme satisfies the following properties:Existential unforgeable,signer ambiguous,linkable and verifiable. 通过安全分析,该方案满足存在不可伪造性、签名者匿名性、可关联性、可验证性等特点。
- The security analysis of the schemes shows that they have the property of unforgeability,source hiding and privacy of signer's identity. 安全分析表明它们具有不可伪造性、签名源的隐匿性和签名者身份的匿名性。
- Tnis measure method supplies reliable data for security analysis and designing installed flange of steam turbine' s vane. 此项技术可为汽轮机叶片安装轮缘的设计和安全性分析提供可靠依据。
- Quantitative Analysis A security analysis that uses financial information derived from company annual reports and income statements to evaluate an investment decision. 定量分析指利用公司年报及损益表提供的财务资料作出投资决策的证券分析方法。
- Quantitative Network Security Analysis Finally, we have also developed a preliminary analysis of the technical requirements for effective worm countermeasures. 最后,对高效的对付蠕虫的策略的技术要求我们已经作了初步的分析。
- Quantitative Network Security Analysis In related work, we have used a similar approach to monitor the spread of Internet worms such as CodeRed and Nimda. 最近,他们还使用了类似的方法来监控互联网的病毒,比如红色代码和尼姆达。
- Quantitative Network Security Analysis The potential impact of this proposal is the creation of an empirical dataset that describes large-scale attacks across the global Internet. 我们还会创建一个经验数据集,描述全球互联网的大规模攻击。
- At last, this paper presents the normalization of vegetable planting knowledgerepresentation and XSL style sheet description, as well as system security analysis. 最后,本文介绍了蔬菜栽培知识表示规范化和XSL样式单描述,以及系统的安全性分析。
- Security analysis indicate that I-TTS scheme is contributory,and no one can predetermine the negotiated group key.Further more,the I-TTS scheme is perfect forward secrecy. 安全性分析表明,I-TTS协议不仅克服了TTS协议中的前向安全性和密钥控制缺陷,还满足等献性。
- As an essential part in the power system security analysis, the whole process of contingency selection becomes more sensible by taking the probability aspect into consideration. 作为电力系统安全分析中的重要组成部分,偶然事故的选择由于在分析过程中加入了对事故发生率的考虑而变得更具有合理性。
- Further security analysis shows that this new scheme can resist all the attacks proposed in previous literatures, so its security is much higher than WCL scheme and TJC scheme. 进一步的分析表明,该方案能够抵抗已知的各种攻击,较WCL方案以及TJC方案具有更高的安全性。
- Basic concepts of reliability evaluation and probability dynamic security analysis (PDSA)in planning of AC/DC hybrid transmission systems are described in this paper. 阐述了在交直流并联输电系统规划中进行可靠性评估和概率动态安全分析的基本概念。
- The experiment shows that the efficiency of the encryption and decryption is improved. 3.The security analysis of the novel algorithm and NTRU is given. 3.;在简介密码分析技术的基础上;对新算法和NTRU算法安全性进行了详细的分析和对比;对主要攻击方式和效果进行了总结。