Random good picture Not show
1 A more secure protocol is HTTPS (HTTP over SSL), which uses SSL to encrypt HTTP messages.
2 After a secure protocol is bought forward, the security must be verified on its various aspects as possible as we can.
3 The paper studies the English auction secure protocol. An efficient and secure English auction protocol is proposed with signature based on proof of knowledge.
4 The policy defines the secure protocol and credential passing required for secure interoperability between the TCS and the service.
5 The approach can be applied to all secure protocols, and it is easier for people to design secure protocol, and to implement the auto-design of secure protocol.
6 A proved secure protocol for watermark verification based on perfect zero knowledge interactive proof system and bit commitments scheme is proposed.
7 If you want to use a more secure protocol, refer to the CVS manual in Resources.
8 It is a more efficient and secure protocol, which solves the bottleneck problem of trusted third party.
9 This paper proposes a new RFID secure protocol which uses the mechanism that the random sequence stored in the tag produces the pseudo random number to replace the random value generator.
10 Analysis results show that it is a secure protocol and more efficient than other protocols.
11 Communications among IKE protocol and policy-management module and Secure protocol module are implemented by PF_KEY socket. Policy-management is the basement of implementation of IPSEC protocol.
12 The Linden Lab approach appears to be to focus on a secure protocol such that untrusted clients are not a threat, and publish everything.
13 At its inception, DNS was not designed to be a secure protocol. Because of its vulnerability, DNS faces many threats from a variety of aspects.
14 In this paper, a bilateral-authentication cryptographic protocol is proposed. It is a more efficient and secure protocol,[www.Sentencedict.com] which solves the bottleneck problem of the trusted third party.
15 Set forth a cipher synchronization scheme in the connectionless oriented IP layer, also present the state transform map of this secure protocol.
16 Verifiable secret sharing, group signature and signature of knowledge are useful in protecting important and sensitive information and always used in designing secure protocol of cryptology.
17 Based on two basic protocols of secure multi-party computation, a secure protocol is designed for determining whether two spacial spheres intersect, and its correctness and security are analyzed.
18 Traditionally, the security of cryptographic chips depends on the mathematic complexity of the cryptographic algorithms, the authentication mode and the secure protocol.
19 The way to implement the authority and authentication using middleware as well as related secure protocol is discussed. The security of the system's architecture is also analyzed.
More similar words: Post Office Protocol, protocol, protocol suite, internet protocol, User Datagram Protocol, application protocol, file transfer protocol, communications protocol, hypertext transfer protocol, transmission control protocol, Address Resolution Protocol, secure, securer, secured, securely, insecure, unsecured, insecurely, secured loan, secured debt, unsecured loan, unsecured debt, unsecured bond, security measure, security of tenure, security measures, pure profit, collective security, secure environment, moisture-proof.