助手标题
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
共[4162]条 当前为第1条到20条[由于搜索限制,当前仅支持显示前5页数据]
 

相关语句
security
In this paper, we use a direct method to solve the optimal portfolio and consumption choice problem in the security market for a specific case, in which the utility function is of a given homogenous form, i.e.
      
This paper analyzes the aritrage-free security markets and the general equilibrium existence problem for a stochastic economy with incomplete financial markets.
      
Linear provable security for a class of unbalanced feistel network
      
Application of this structure to block cipher designs brings out the provable security against linear attack with the upper bounds of probabilities.
      
Trust management was discussed according to the security requirements in distributed environment.
      
The design offers a class of nonlinear FH codes with high security, large linear span and a uniform spread over the entire frequency bandwidth.
      
An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).
      
The results show that the integrated user access control method can reduce the costs of system security maintenance and management.
      
However, security has been one of the crucial problems in its application.
      
A method for detecting code security vulnerability based on variables tracking with validated-tree
      
SQL injection poses a major threat to the application level security of the database and there is no systematic solution to these attacks.
      
Different from traditional run time security strategies such as IDS and firewall, this paper focuses on the solution at the outset; it presents a method to find vulnerabilities by analyzing the source codes.
      
The system can get very high supercharging pressure when the speeds of the two stage turbochargers are rather low, which ensures the system's security and reliability.
      
The security and recent technology of quantum key distribution
      
However, the security of the existing real system for QKD needs to be carefully examined.
      
Crossutting concerns such as logging, security, and transaction, are well supported in the programming level by aspect-oriented programming technologies.
      
The formal methods for security protocols guarantee the security properties of protocols.
      
Instantiation Space Logic is a new security protocol logic, which has a strong expressive power.
      
Compositional Logic is also a useful security protocol logic.
      
Moreover, those security protocols described in Compositional Logic can be automatically verified by the verifier of Instantiation Space.
      
 

首页上一页12345下一页尾页 

 
CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社