• This chapter provides design patterns for data confidentiality and data origin authentication.

    数据保密性数据来源鉴定提供了设计模式

    youdao

  • In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation.

    该文按照协议分类分别概述几个具有代表性不可否认数据源认证协议,并对每一个协议的优缺点存在问题进行了讨论。

    youdao

  • In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation.

    该文按照协议分类分别概述几个具有代表性不可否认数据源认证协议,并对每一个协议的优缺点存在问题进行了讨论。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定