英语人>网络例句>internet protocol 相关的网络例句
internet protocol相关的网络例句

查询词典 internet protocol

与 internet protocol 相关的网络例句 [注:此内容来源于网络,仅供参考]

To further investigate the influence of the Internet on the students, a further research is conducted by breaking the students into three groups -frequent Internet users, occasional Internet users and non-internet users. The result indicates that the self-harmony of frequent Internet users shows a sharp difference in terms of school and grade, the self and the unharmony of show a sharp difference in terms of school, grade and sex, and that the self-esteem and the two dimension - the flexibility and rigidity of self-harmony show no difference in terms of school, age and sex; the self-harmony and all dimensions of occasional Internet users show no significant difference, the self-esteem of occasional Internet users show no significant difference in terms of school and grade but show significant difference in terms of sex; the self-harmony and all dimensions of the non-Internet users show no significant difference, the self-esteem of the non-Internet users show no significant difference in terms of grade and sex, and the self-esteem of the non-Internet users show significant difference in terms of school.

为了进一步研究网络对学生的影响,又将学生分为经常上网、偶尔上网、不上网三类分别来研究:经常上网学生自我和谐在学校、年级都存在极显著差异,自我与经验的不和谐在学校、年级、性别存在极显著差异,自尊和自我和谐的灵活性和刻板性两个维度在学校、年龄、性别都没有差异;偶尔上网学生,自我和谐及各维度都不存在显著性差异,自尊在学校和年级不存在显著性差异,在性别上有显著性差异;不上网学生自我和谐及各维度都不存在显著性差异,自尊在年级和性别不存在显著性差异,自尊在学校上有显著性差异。

This paper discusses Internet Protocol, User Data Protocol, Internet Control Message Protocol and Address Resolution Protocol mostly.

在协议方面主要讨论了网际协议IP、用户数据报协议UDP、Internet控制报文协议ICMP、物理地址解析协议ARP。

We do research on the transitions between states of network protocol,the protocol misusage detection model based on Markov chain,the framework of the IDS technology and protocol anormity after we discuss the current technology. The main research contents of this paper include: research on transitions between states of network protocol and session process, protocol misuage and the anomaly detection model based on Markov chain, the research of intrusion detection framework, more accurately model based on the characteristic of the network traffic and so on.

在分析了现有入侵检测系统的基础上,本文围绕典型网络协议状态转换、基于马尔可夫链的检测模型、入侵检测技术框架、以及协议异常等几个方面展开深入研究,主要工作内容包括:典型网络协议转换状态的分析和会话过程的研究;基于马尔可夫链的网络异常检测模型;分布式的检测架构;针对网络流量特征而提出了精确的检测模型等。

If two parties want to sign a contract C over a communication network, they must "simultaneously" exchange their commitments to C Since simultaneous exchange is usually impossible in practice, protocols are needed to approximate simultaneity by exchange partial commitments in a piece by piece manner The party of secondly sending commitments may have a slight advantage; a "fair" protocol must keep this advantage within acceptable limits The protocol for signing a contract is improved based on the research result of secure multiparty computation In this protocol, the parties obliviously transfer the signed bit and the committed bit; the other parties can prove the validity of this bit based on the confirming sub protocol, but he can't gain more information about the whole signature by accumulating the signed bit or the committed bit After the parties exchange the whole signed information, they declare the commitment about the signature respectively, and gain the whole signature of the other party At this moment, the party doesn't care about the advance quit of the other party, because he has gained the whole signed information Finally, it is proved that this protocol is quit fairness

作者中文名:曲亚东;侯紫峰;韦卫摘要:在网络环境中解决合同签订问题需要保证信息交换的同时性,以前提出的协议都会给第2个发送者部分计算特权,利用不经意传输协议则可以解决这个问题。在协议执行过程中,参与者将合同的签名位以及他对签名位的承诺不经意传输给对方,对方可以利用验证子协议证明该位的有效性,但是他却不能通过位交换次数的增加获取更多的完整签名的信息;在完成签名位的交换之后,参与者分别宣布承诺,并得到对方对合同的完整签名;在宣布承诺时,协议参与者已经获得全部的签名内容,要么是签名位,要么是对方对该位的承诺,因此参与者并不需要担心对方提前终止协议。在文章的最后利用多方安全计算的结论证明了该协议满足终止公平性。

If two parties want to sign a contract C over a communication network, they must "simultaneously" exchange their commitments to C Since simultaneous exchange is usually impossible in practice, protocols are needed to approximate simultaneity by exchange partial commitments in a piece by piece manner The party of secondly sending commitments may have a slight advantage; a "fair" protocol must keep this advantage within acceptable limits The protocol for signing a contract is improved based on the research result of secure multiparty computation In this protocol, the parties obliviously transfer the signed bit and the committed bit; the other parties can prove the validity of this bit based on the confirming sub protocol, but he cant gain more information about the whole signature by accumulating the signed bit or the committed bit After the parties exchange the whole signed information, they declare the commitment about the signature respectively, and gain the whole signature of the other party At this moment, the party doesnt care about the advance quit of the other party, because he has gained the whole signed information Finally, it is proved that this protocol is quit fairness

在网络环境中解决合同签订问题需要保证信息交换的同时性,以前提出的协议都会给第 2个发送者部分计算特权,利用不经意传输协议则可以解决这个问题在协议执行过程中,参与者将合同的签名位以及他对签名位的承诺不经意传输给对方,对方可以利用验证子协议证明该位的有效性,但是他却不能通过位交换次数的增加获取更多的完整签名的信息;在完成签名位的交换之后,参与者分别宣布承诺,并得到对方对合同的完整签名;在宣布承诺时,协议参与者已经获得全部的签名内容,要么是签名位,要么是对方对该位的承诺,因此参与者并不需要担心对方提前终止协议在文章的最后利用多方安全计算的结论证明了该协议满足终止公平性1 引言两个参与者A和B想要通过网络协商签订合同C 为了保证公平性,参与者必须同时交换自己对合同的签名,然而在实际的网络环境中,想要完全同时地交换对合同的签名是不可能的,他们必须将签名分成若干块依次地执行,以保证大致的同时性但是这种方法依然存在着问题

In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it's more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer's right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer's participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer's watermark without decrypting it in our scheme.

本文除应用RSA非对称式加密与秘密同态机制,提出了一个符合现实生活中买卖交易行为、可弹性调整加密范围数位内容买卖浮水印协定,强化了目前研究中对於数位内容买-卖浮水印协定的安全性,并进一步的考量二手商品交易行为,在可弹性调整加密范围数位内容买卖浮水印协定基础上,提出一个结合数位内容二手买卖与盗版追踪的二手数位内容买卖浮水印协定,达到让参予买卖的角色可以在安全的情形下完成二手数位内容所有权的移转并从中获取相对应利益的目标的数位内容转卖浮水印协定来增强了目前数位内容买卖浮水印协定研究中对於二手交易欠缺之处,解决了数位内容买卖浮水印协定中所可能遭遇的重要安全性议题,如:买方权益、盗版追踪、资讯不连结、共谋、买方需要参与仲裁、中间者攻击及匿名性问题。

Internet ethics develops with the development of internet technology,which is used to adjust the internet action and makes sure the good order of internet .Freedom,globality and distribution of internet have improved the behavior bodies also do some unmoral things for example:internet rack,internet virus ,internet crime and so on .

网络的自由性、全球性以及传播方式的超地域性,扩大了行为主体的行为能力、行为方式和行为范围,与此同时,作为行为主体的网民也出现了一些不道德行为:网络黑客、网络病毒、网络犯罪等。

In China, the Electronic Business and the Internet Sales stilted late and until 1996, they were attempted by Chinese enterprises , Now the Internet Sales has been adopted by the Chinese enterprises, All kinds of Internet investigations, Intersperses , All kinds of Internet investigations , Internet advertisements , Internet distributions and Internet services have interfered in the trade of enterprises ,However , compared to the developed countries , the general conditions of Chinese Internet sides is at a low level and it remands on the primary stage .

中国的网络营销起步较晚,直到1996年才开始被中国企业尝试,与发达国家相比,中国网络营销发展的总体水平较低,仍停留在起步阶段。

Open Shortest Path First is a routing protocol developed for Internet Protocol networks by the Interior Gateway Protocol working group of the Internet Engineering Task Force. The working group was formed in 1988 to design an IGP based on the Shortest Path First algorithm for use in the Internet.

最短路径优先是Internet 任务工程组的一个工作组为IP网络开发的一个内部网关路由选择协议,该工作小组成立于1988年并致力于为INTERNET应用设计一个基于最短路径优先算法的内部网关路由协议。

On the basis of analyzing modbus protocol and tcp/ip protocol, the design method of retrenching tcp/ip protocol is proposed, and multi-connection signal gathering device based on tcp/modbus protocol is designed. the method of transmitting data between the signal gathering device and multi-hosts in the internet is analysed.

在详细分析tcp/ip协议和modbus协议的基础上,提出对tcp/ip协议进行精简的设计方法,设计了基于tcp/modbus协议的面向多连接信号采集器,重点分析了信号采集器和多台计算机通过internet传输数据的方法。

第1/500页 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Internet Thugs Attack
My Internet Girl
You've Got Mail Enhancement
Internet Connection
Internet Going Nutz
Protocol
Internet Killed The Video Star
Internet Relationships (Are Not Real Relationships)
Cybersex
Unorthodox
推荐网络例句

Objective To study the effect of chitosan in the prevention of fibrous scar formation in the epidural space after laminectomy.

目的 观察选择性脊神经后根切除术椎板切除后硬膜外几种防瘢痕粘连物质的作用并探讨其机制。

On his way to the lift, he looked back to us or was it me his eyes pointing?

当他要进电梯时,他回头看我们(或者说是我,他的眼光?

Galileo was a famous Italian scientist by whom the Copernican theory was further proved correct.

伽利略是意大利著名的科学家,他进一步证明了哥白尼学说是正确的。