source authentication造句
例句与造句
- on improving multicast source authentication to achieve better security
基于消息认证码的组播源认证研究 - these restricts make source authentication difficultly accomplish in multicast environment
这使得在组播环境中进行源认证非常困难。 - a novel video multicast instant source authentication model based on digital watermarking
一种基于数字水印的视频多点广播立即源认证模型 - in order to solve the problems of current source authentication methods, this thesis brings forward a new source authentication scheme based on the events sequence---- esa ( events sequence authentication ) . this scheme does not depend on the time synchronous mechanism, and it has the advantages of fast authentication and
根据现有源认证方法的不足和存在问题,本文提出了基于事件序列的源认证方案esa(eventssequenceauthentication),该方案不依赖时间同步机制,具有快速认证,抗丢失性和扩展性较好的特点。 - in order to solve the problems of current source authentication methods, this thesis brings forward a new source authentication scheme based on the events sequence---- esa ( events sequence authentication ) . this scheme does not depend on the time synchronous mechanism, and it has the advantages of fast authentication and
根据现有源认证方法的不足和存在问题,本文提出了基于事件序列的源认证方案esa(eventssequenceauthentication),该方案不依赖时间同步机制,具有快速认证,抗丢失性和扩展性较好的特点。 - It's difficult to find source authentication in a sentence. 用source authentication造句挺难的
- from the research, we know that there has been no very good source authentication method which can satisfy the users " demands . the primary reason of no good method is higer requirement in multicast environment . we need efficient authentication even when there are packet loss and no senders " information
从本文对源认证方法做的系统性研究可以得知,目前尚没有很好的能满足用户需求的源认证,其主要原因是由于在组播环境中对数据认证有较高的要求,即需要在有包丢失、发送者不知道接收者状态的情况下,高效的认证数据包。 - this thesis detailedly researches into source authentication, introducing and analyzing some previous source authentication methods . it analyzes a source authentication method ( tesla ) which is being paid more and more attention nowadays, its function, shortcoming and current improvement, and points out its secure vulnerability . we draw a conclusion : though tesla has many advantages, such as the low communication cost, tolerance of pack loss, there are still many problems, which mostly arise from the requirement of synchronous time
并对其中一种目前广泛受到人们关注的源认证方法tesla协议进行了研究,包括对tesla的功能、原理、缺陷以及现有的改进做了分析,指出其中的安全漏洞,并得到以下结论:尽管tesla有许多优点,如低通讯成本,较好的抗丢失性,但它仍然存在许多难以克服的缺陷,而这些问题主要是由于tesla所依赖的时间同步机制在现有网络环境下不易实现所带来的。 - this thesis detailedly researches into source authentication, introducing and analyzing some previous source authentication methods . it analyzes a source authentication method ( tesla ) which is being paid more and more attention nowadays, its function, shortcoming and current improvement, and points out its secure vulnerability . we draw a conclusion : though tesla has many advantages, such as the low communication cost, tolerance of pack loss, there are still many problems, which mostly arise from the requirement of synchronous time
并对其中一种目前广泛受到人们关注的源认证方法tesla协议进行了研究,包括对tesla的功能、原理、缺陷以及现有的改进做了分析,指出其中的安全漏洞,并得到以下结论:尽管tesla有许多优点,如低通讯成本,较好的抗丢失性,但它仍然存在许多难以克服的缺陷,而这些问题主要是由于tesla所依赖的时间同步机制在现有网络环境下不易实现所带来的。 - this thesis detailedly researches into source authentication, introducing and analyzing some previous source authentication methods . it analyzes a source authentication method ( tesla ) which is being paid more and more attention nowadays, its function, shortcoming and current improvement, and points out its secure vulnerability . we draw a conclusion : though tesla has many advantages, such as the low communication cost, tolerance of pack loss, there are still many problems, which mostly arise from the requirement of synchronous time
并对其中一种目前广泛受到人们关注的源认证方法tesla协议进行了研究,包括对tesla的功能、原理、缺陷以及现有的改进做了分析,指出其中的安全漏洞,并得到以下结论:尽管tesla有许多优点,如低通讯成本,较好的抗丢失性,但它仍然存在许多难以克服的缺陷,而这些问题主要是由于tesla所依赖的时间同步机制在现有网络环境下不易实现所带来的。