查询词典 internet mail access protocol
- 与 internet mail access protocol 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
According to the equivalence relation on the set of security protocol,equivalence class of security protocol is divided,so amount of researching security protocol is decreased.
利用安全协议集合上的等价关系,可以划分出安全协议等价类,从而减少了需研究的安全协议的数量。
-
CIFS can be seen as an application protocol such as file transfer protocol and hypertext transfer protocol an implementation.
CIFS可以看做是应用程序协议如文件传输协议和超文本传输协议的一个实现。
-
Three network coding protocols, i.e., non-regenerative network coding protocol, regenerative complex field network coding protocol and regener-ative Galois field network coding protocol are proposed and applied to the multicastnetwork to enhance the throughput.
然后,本文研究了两源、两宿、单中继的协作组播网络,提出了三种网络编码协议,即非再生网络编码(Non-Regenerative NetworkCoding,NRNC)、复数域再生网络编码(Regenerative Complex FiledNetwork Coding,RCNC)和伽罗华域再生网络编码(Regenerative GaloisFiled Network Coding,RGNC)。
-
But this kind of invasion cannot avoid the detection of IDS using the protocol analysis technology.(2) In the invasion activities of hackers using TCP, the actions about scanning and Denial of Service utilizing the three-handshake protocol are general. The characteristics of the actions are dynamic for its lie on a series of packets from beginning to end. So the IDS using the traditional pattern match technology cannot detect these actions effectively, but the IDS using the protocol analysis technology can do its.
2在利用TCP协议进行的黑客活动中,比较常用的是利用三次握手过程进行扫描行为和拒绝服务攻击,这类攻击的特征必须根据前后的一系列数据包才能确定,因此攻击特征具有动态性,很不适合于采用模式匹配作为信息检测技术的IDS,但协议分析技术可较为迅速地检测出这类攻击。
-
The formal description technology based on LOTOS, the formal transformation, the formal validation and implemenation are generalized. Constructions of communication service and communication protocol, transformation from service specification into protocol specification based on bisimulation equivalence are also stated in detail. Application of LOTOS specification styles and architecture concept in service and protocol design is studied as an emphasis.
归纳总结了基于LOTOS的形式化描述方法、形式化的转换、验证和实现等方法理论,以及通信服务和协议的构造方法及服务规范到协议规范的等效性转换方法,重点研究了规范风格和结构概念在服务和协议设计中的应用。
-
We improve the protocol for signing contract based on the research result of secure multiparty computation. In this protocol, the parties obliviously transfer the signed bit and the committed bit; the other parties can prove the validity of this bit based on the confirming sub-protocol, but he can't gain more information about the whole signature by accumulating the more signed bit or the committed bit. After the parties exchange the whole signed information, they declare the commitment about the signature respectively, and gain the whole signature of the other party. At this moment, the party doesn't care about the advance quit of the other party, because he has gained the whole signed information.
在协议执行过程中,参与者将合同的签名位以及他对签名位的承诺不经意传输给对方,对方可以利用验证子协议证明该位的有效性,但是他却不能通过位交换次数的增加获取更多的完整签名的信息;在完成签名位的交换之后,参与者分别公开承诺,并得到对方对合同的完整签名;在公开承诺时,协议参与者已经获得全部的签名内容,要么是签名位,要么是对方对该位的承诺,因此参与者并不需要担心对方提前终止协议,同时本文也利用多方安全计算的结论证明了该协议满足终止公平性。
-
In the third example, USC ISI's anonymous payment protocol [19] is analyzed to show that the protocol does not provide both the payor and the payee with some accountability assurances discussed in this paper, in agreement with the goals of this protocol.
在第三个例子, USC ISI 的匿名付款协议[ 19 ] 被分析表示,协议不提供payor 和收款人以一些责任保证被谈论在本文里,在与这个协议的目标的协议。
-
The electronic payment protocol based on offline-TTP is made up of multiple sub-protocols, and is significantly different from traditional authentication protocol, especially on protocol goal and penetrator model.
基于Offline-TTP的电子支付协议通常具有复杂结构,由多个子协议组合而成,与传统认证协议具有显著不同,主要表现在协议目标和攻击者模型两个方面。
-
In this paper,one privacy-preserving signed distance protocol is presented to solve the signed distance problem based on scalar product protocol.The security and correctness of the protocol are also discussed.And then the privacy-preserving of the triangle intersection with the plane determines is taken as the example to explain its application.
基于点积协议,提出了一个保护私有信息的符号距离判定协议,解决了符号距离的判定问题,然后讨论和分析了协议的安全性与正确性,并且以保护私有信息的三角形与平面相交判定为例说明了其应用。
-
Based on semi-honest model and scalar product protocol, a protocol of the bipartite set intersection was constructed, which complexity is O; another protocol of the tripartite set intersection needs O(2ntp).
在半诚实模型下,基于点积协议设计的两方集合交集协议,复杂度为O;设计的三方集合交集协议,复杂度为O(2ntp)。
- 相关中文对照歌词
- Bring My Mail
- FanMail
- Santa.Com (aka I'm Gonna Email Santa)
- Internet Thugs Attack
- My Internet Girl
- You've Got Mail Enhancement
- Internet Going Nutz
- Internet Connection
- Big Sunglasses
- Access Me
- 推荐网络例句
-
But this is impossible, as long as it is engaging in a market economy, there are risks in any operation.
但是,这是不可能的,只要是搞市场经济,是有风险的任何行动。
-
We're on the same wavelength.
我们是同道中人。
-
The temperature is usually between 300 and 675 degrees Celsius.
温度通常在摄氏300度到675度之间。