英语人>网络例句>protocol 相关的网络例句
protocol相关的网络例句

查询词典 protocol

与 protocol 相关的网络例句 [注:此内容来源于网络,仅供参考]

It is part of the Transmission Control Protocol/Internet Protocol protocol suite.

在SNMP环境下,几乎所有的工作都是由网络管理系统来处理的。

But this kind of invasion cannot avoid the detection of IDS using the protocol analysis technology.(2) In the invasion activities of hackers using TCP, the actions about scanning and Denial of Service utilizing the three-handshake protocol are general. The characteristics of the actions are dynamic for its lie on a series of packets from beginning to end. So the IDS using the traditional pattern match technology cannot detect these actions effectively, but the IDS using the protocol analysis technology can do its.

2在利用TCP协议进行的黑客活动中,比较常用的是利用三次握手过程进行扫描行为和拒绝服务攻击,这类攻击的特征必须根据前后的一系列数据包才能确定,因此攻击特征具有动态性,很不适合于采用模式匹配作为信息检测技术的IDS,但协议分析技术可较为迅速地检测出这类攻击。

The Line Printer Remote is a printer protocol that uses Transfer Control Protocol/ Internet Protocol to establish connections between printers and workstations on a network.

该行式打印机远程是一种协议,它使用的打印机传输控制协议/ Internet协议来建立一个打印机和工作站之间的网络连接。

The formal description technology based on LOTOS, the formal transformation, the formal validation and implemenation are generalized. Constructions of communication service and communication protocol, transformation from service specification into protocol specification based on bisimulation equivalence are also stated in detail. Application of LOTOS specification styles and architecture concept in service and protocol design is studied as an emphasis.

归纳总结了基于LOTOS的形式化描述方法、形式化的转换、验证和实现等方法理论,以及通信服务和协议的构造方法及服务规范到协议规范的等效性转换方法,重点研究了规范风格和结构概念在服务和协议设计中的应用。

We improve the protocol for signing contract based on the research result of secure multiparty computation. In this protocol, the parties obliviously transfer the signed bit and the committed bit; the other parties can prove the validity of this bit based on the confirming sub-protocol, but he can't gain more information about the whole signature by accumulating the more signed bit or the committed bit. After the parties exchange the whole signed information, they declare the commitment about the signature respectively, and gain the whole signature of the other party. At this moment, the party doesn't care about the advance quit of the other party, because he has gained the whole signed information.

在协议执行过程中,参与者将合同的签名位以及他对签名位的承诺不经意传输给对方,对方可以利用验证子协议证明该位的有效性,但是他却不能通过位交换次数的增加获取更多的完整签名的信息;在完成签名位的交换之后,参与者分别公开承诺,并得到对方对合同的完整签名;在公开承诺时,协议参与者已经获得全部的签名内容,要么是签名位,要么是对方对该位的承诺,因此参与者并不需要担心对方提前终止协议,同时本文也利用多方安全计算的结论证明了该协议满足终止公平性。

In the third example, USC ISI's anonymous payment protocol [19] is analyzed to show that the protocol does not provide both the payor and the payee with some accountability assurances discussed in this paper, in agreement with the goals of this protocol.

在第三个例子, USC ISI 的匿名付款协议[ 19 ] 被分析表示,协议不提供payor 和收款人以一些责任保证被谈论在本文里,在与这个协议的目标的协议。

The electronic payment protocol based on offline-TTP is made up of multiple sub-protocols, and is significantly different from traditional authentication protocol, especially on protocol goal and penetrator model.

基于Offline-TTP的电子支付协议通常具有复杂结构,由多个子协议组合而成,与传统认证协议具有显著不同,主要表现在协议目标和攻击者模型两个方面。

After studying the MAC protocol of Ad hoc network and by modifying the Wireless Token Ring Protocol, a new uncontested Distributed Parallel Wireless Polling Access Protocol that can provide MAC QoS guarantees for Ad hoc network is presented, and the mathematical model is established by the embedded Markov chain theory and the probability generating function method. Based on it, the mean value of queue length and message waiting time are explicitly obtained.

摘要该文对Ad hoc网络的MAC层协议进行了研究,通过对无线令牌环协议进行改进,提出了一种新的具有QoS保障的无竞争的分布式并行无线轮询访问协议,并采用嵌入Markov链和概率母函数的分析方法,用限定服务规则进行了系统建模,在系统模型的基础上得到了系统的平均排队队长以及平均等待时间的解析结果。

The method comprises the following steps: a conversation initialization request message transmitted by a service requester is received, wherein the request message comprises an application service quality parameter and service description information; according to the application service quality parameter and the service description information, a access protocol intermediate node of the corresponding simple object and a service provider are selected; according to the intermediate node and the service provider, access protocol routing information of the corresponding simple object can be acquired; and the conversation initialization request message containing the access protocol routing information of the simple object is transmitted to the corresponding service provider.

本发明方法包括:接收服务请求方发送的会话初始化请求消息,所述会话初始化请求消息中包含应用服务质量参数以及业务描述信息;根据所述应用服务质量参数以及业务描述信息选择对应的简单对象访问协议中介节点以及服务提供方;根据所述简单对象访问协议中介节点以及服务提供方获取对应的简单对象访问协议路由信息;向对应的服务提供方发送包含所述简单对象访问协议路由信息的会话初始化请求消息。本发明还提供一种路由系统以及相关设备。

In this paper,one privacy-preserving signed distance protocol is presented to solve the signed distance problem based on scalar product protocol.The security and correctness of the protocol are also discussed.And then the privacy-preserving of the triangle intersection with the plane determines is taken as the example to explain its application.

基于点积协议,提出了一个保护私有信息的符号距离判定协议,解决了符号距离的判定问题,然后讨论和分析了协议的安全性与正确性,并且以保护私有信息的三角形与平面相交判定为例说明了其应用。

第5/100页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Protocol
Protocol
Protocol
Protocol
推荐网络例句

I use an example quoted by Hu Jiaqi:"It is reported that America separates the DNA of a kind of virus by making use of genetic technology and combines it with another kind of DNA. Finally, they get a kind of virulent biological agent called a "pyrotoxin". Someone discloses in private that 20 grams of such a kind of biological agent could result in the global death of 6 billion people due to infection."

我在这里例举胡家奇所引用过的例子:"据报道,美国利用转基因技术,将一种病毒的DNA分离出来,与另外一种DNA进行结合,拼结成一种剧毒的"热毒素"生物战剂,且私下有人透露,这种生物战剂只需20克,就可以导致全球60亿人全部感染死亡。"

Waiting, for the queers and the coons and the Reds and the Jews.

等待着疯子和黑人还有红色共产主义者还有犹太人

"Everybody talks about what a horrible job it is to brief the press,but I love these briefings!"

&每个人都说,简报新闻是一份多么糟糕的工作,,但是我爱这些简报。&