Directly to word page Vague search(google)
Home > Secure protocol in a sentence

Secure protocol in a sentence

  up(0)  down(0)
Sentence count:19Posted:2021-04-02Updated:2021-04-02
Similar words: Post Office Protocolprotocolprotocol suiteinternet protocolUser Datagram Protocolapplication protocolfile transfer protocolcommunications protocol
Random good picture Not show
1 A more secure protocol is HTTPS (HTTP over SSL), which uses SSL to encrypt HTTP messages.
2 After a secure protocol is bought forward, the security must be verified on its various aspects as possible as we can.
3 The paper studies the English auction secure protocol. An efficient and secure English auction protocol is proposed with signature based on proof of knowledge.
4 The policy defines the secure protocol and credential passing required for secure interoperability between the TCS and the service.
5 The approach can be applied to all secure protocols, and it is easier for people to design secure protocol, and to implement the auto-design of secure protocol.
6 A proved secure protocol for watermark verification based on perfect zero knowledge interactive proof system and bit commitments scheme is proposed.
7 If you want to use a more secure protocol, refer to the CVS manual in Resources.
8 It is a more efficient and secure protocol, which solves the bottleneck problem of trusted third party.
9 This paper proposes a new RFID secure protocol which uses the mechanism that the random sequence stored in the tag produces the pseudo random number to replace the random value generator.
10 Analysis results show that it is a secure protocol and more efficient than other protocols.
11 Communications among IKE protocol and policy-management module and Secure protocol module are implemented by PF_KEY socket. Policy-management is the basement of implementation of IPSEC protocol.
12 The Linden Lab approach appears to be to focus on a secure protocol such that untrusted clients are not a threat, and publish everything.
13 At its inception, DNS was not designed to be a secure protocol. Because of its vulnerability, DNS faces many threats from a variety of aspects.
14 In this paper, a bilateral-authentication cryptographic protocol is proposed. It is a more efficient and secure protocol,[] which solves the bottleneck problem of the trusted third party.
15 Set forth a cipher synchronization scheme in the connectionless oriented IP layer, also present the state transform map of this secure protocol.
16 Verifiable secret sharing, group signature and signature of knowledge are useful in protecting important and sensitive information and always used in designing secure protocol of cryptology.
17 Based on two basic protocols of secure multi-party computation, a secure protocol is designed for determining whether two spacial spheres intersect, and its correctness and security are analyzed.
18 Traditionally, the security of cryptographic chips depends on the mathematic complexity of the cryptographic algorithms, the authentication mode and the secure protocol.
19 The way to implement the authority and authentication using middleware as well as related secure protocol is discussed. The security of the system's architecture is also analyzed.
More similar words: Post Office Protocolprotocolprotocol suiteinternet protocolUser Datagram Protocolapplication protocolfile transfer protocolcommunications protocolhypertext transfer protocoltransmission control protocolAddress Resolution Protocolsecuresecurersecuredsecurelyinsecureunsecuredinsecurelysecured loansecured debtunsecured loanunsecured debtunsecured bondsecurity measuresecurity of tenuresecurity measurespure profitcollective securitysecure environmentmoisture-proof
Total 19, 30 Per page  1/1 
Leave a comment
Welcome to leave a comment about this page!
Your name:
Latest commentsInto the comment page>>
More words