网站首页  词典首页

请输入您要查询的英文单词:

 

单词 security protocols
释义

security protocols

  • 网络安全协议;安全协定;定书
1.
安全协议
2012第13届“并行和分布... ... - Cloud security 云安全) - Security protocols 安全协议) - Interconnection networks 互联网络) ...
www.ei10.com
2.
安全协定
...Transport Layer Security)安全协定(Security Protocols)。
ccie11440.blogspot.com
3.
定书
定书security protocols)用来保护答案及
wwwc.moex.gov.tw

例句

释义:
1.
Thomas, passive RFID tags is very easy to counterfeit, because they do not contain the traditional encryption and security protocols.
Thomas教授称,无源RFID标签很容易伪造,因为它们不含有传统的加密算法和安全协议。
www.bing.com
2.
This paper proposes a non-monotonic logic which can be used to analyze the properties of security protocols.
本文提出一种对安全协议进行分析的非单调逻辑。
www.dictall.com
3.
Experimental result shows that the tool can simplify the proving process, and improve the efficiency of security protocols verification.
实现结果表明,该工具简化了安全协议的证明过程,提高了效率,具有较好的实用性。
211.151.93.212
4.
Several XML security protocols have been proposed to support communication data security in XML applications.
已提出了几个XML安全性协议以在XML应用程序中支持通信数据安全性。
www-128.ibm.com
5.
This pattern would support a wide range of incoming security protocols while simplifying security in other ESB components.
此模式将支持各种传入安全协议,而且同时能简化其他ESB组件中的安全措施。
www.ibm.com
6.
The Negotiate protocol selects either NTLM or Kerberos depending on the security protocols supported by the client and server.
协商协议可以选择NTLM或Kerberos,具体选择哪一个取决于客户端和服务器所支持的安全协议。
msdn2.microsoft.com
7.
Data Security Technology, data security protocols and P2P technology are the effective measures for Online Privacy protection.
网络信息安全技术、信息安全协议、P2P技术成为网络隐私安全保护的有效手段。
lib.cqvip.com
8.
IPsec uses cryptography-based protection services, security protocols, and dynamic key management.
IPsec使用基于加密的保护服务、安全协议和动态密钥管理。
technet.microsoft.com
9.
Implement control and maintain all Bio-security protocols for the breeding area of the farm.
负责海波尔的各项生物安全制度在本区内的执行。
www.rencai.net
10.
Has the organisation implemented effective information security protocols?
公司有否推行有效的资料保安管理措施?
www.icac.org.hk
1.
One key factor that prevents widespread adoption of IPMI is its lack of support for enterprise security protocols.
一个阻碍广泛采用IPMI的关键因素是缺乏对企业安全协议的支持。
www.ebigear.com
2.
And implement the Negotiate and Secure Sockets Layer security protocols, respectively.
继承,并分别实现协商安全协议和安全套接字层安全协议。
msdn2.microsoft.com
3.
Displayed within the address field if current page uses security protocols.
如果当前页面使用了安全协议,则在地址栏中显示此图标。
help.opera.com
4.
Security protocols for EAI applications are more mature those for Web services.
EAI应用程序的安全协议相对于Web服务要成熟的多。
www-128.ibm.com
5.
Typical examples include logging data about the request or response, processing security protocols, managing session attributes, and more.
典型的例子包括记录关于请求和响应的数据、处理安全协议、管理会话属性,等等。
www.ibm.com
6.
It is designed to create a separation of concerns between application protocols and security protocols.
它用于创建应用程序协议和安全协议之间的分离关系。
www.ibm.com
7.
All of the above security protocols can bind to Web services messaging protocols.
所有上述安全性协议都可以绑定到Web服务消息传递协议。
www-128.ibm.com
8.
Your busted, tired dance moves are no match for my security protocols.
你那徒劳无用的舞步完全不是我的安全协议的对手
www.tingroom.com
9.
People get excited about security protocols and stuff like that.
人们总是对安全协议或类似的内容更感兴趣。
www-128.ibm.com
10.
The supported security protocols are specified when the.
时指定受支持的安全协议。
msdn2.microsoft.com
1.
He is also concerned with the verification of security protocols through semantic formalisms and type checking.
他关注的领域还有通过语义形式和类型检查对安全性协议进行验证。
www.ibm.com
2.
Using these settings requires a knowledge of security protocols.
要使用这些设置需要有安全协议的知识。
angel.w15.5tom.cn
3.
It can also be interconnected with SIVEs located in adjoining provinces, thus facilitating control and the setup of security protocols.
它也可以连接毗邻的SIVE系统,从而利于控制和设置安全协议。(工业和信息化部电子科学技术情报研究所陈皓)
www.etiri.com.cn
4.
The formal method is useful to analyze and verify security protocols. It can uncover bugs which are difficult to find by testing.
采用形式化方法建模和验证安全协议可以检测到传统测试手段难以发现的错误。
www.joces.org.cn
5.
Increase flexibility with an architecture that supports all major security protocols - including SSL, TLS, IPSec, ETS, and DRM
使用支持所有主要安全协议(包括SSL、TLS、IPSec、ETS和DRM)的体系结构增强灵活性
www.certicom.com
6.
See how the upcoming Web services security protocols work - read the WS-Security Profile for XML-based Tokens
请了解即将出现的Web服务安全性协议的工作原理请在
www-128.ibm.com
7.
Auto-Transformation of the Process Algebra Specification of Security Protocols into Logic Programs
安全协议的进程代数规约到逻辑程序的自动转换
service.ilib.cn
8.
Summarization on Security Protocols Formalization
安全协议的形式化方法概述
www.ilib.cn
9.
Analysis and comparison of two network security protocols
两种网络安全协议分析与比较
ilib.cn
10.
Formal Verification Techniques for Security Protocols
安全协议中的形式化验证技术
www.ilib.cn
1.
The Approaches and Technologies for Formal Verification of Security Protocols
安全协议的形式化分析技术与方法
www.ilib.cn
2.
Analysis of correspondence property for security protocols
安全协议关联性分析
www.ilib.cn
3.
Security measures the adherence to security protocols and mechanisms
安全性测量对安全协议和安全机制的遵从性
www-128.ibm.com
4.
Study and implementation of security protocols for wireless local network
无线局域网安全协议的研究和实现
www.ilib.cn
5.
Ford describes the security protocols attached to the new feature, writing
福特并描述了WPA2无线网络的安全特性
www.cnbeta.com
6.
Research on Security Protocols of Quantum Cryptography
量子密码学安全协议的研究
ilib.cn
7.
Formal Specification of Security Protocols
安全协议的形式化规范
ilib.cn
8.
Internet security protocols and related analysis
安全协议与分析
zhidao.baidu.com
9.
Analyzing methods for security protocols combined with the logic of BAN and the space of string
BAN逻辑与串空间相结合的安全协议分析方法
service.ilib.cn
10.
Research on Security Protocols of Capacity Allocation in Supply Chain
基于供应链容量分配中的安全契约研究
www.ilib.cn
1.
Formal Description and Analysis of Security Protocols
安全协议的形式化描述和分析
www.ilib.cn
2.
Combined Analysis Method for Security Protocols
一种安全协议组合分析方法
www.ilib.cn
3.
Using Types for the Verification of Security Protocols
基于类型理论的安全协议验证技术
service.ilib.cn
4.
A Security Protocols'Analytic Approach of Reconciling Two Views
一种调和两种观点的安全协议分析法
www.ilib.cn
5.
A New Taxonomy of Attacks on Security Protocols and Their Security Evaluation
安全协议的攻击分类及其安全性评估
www.ilib.cn
6.
Survey on Theories and Methods of Formal Analyses for Security Protocols
安全协议形式化分析理论与方法研究综述
www.ilib.cn
7.
Automatically Constructing Counter-Examples of Security Protocols Based on the Extended Horn Logic Model
基于Horn逻辑扩展模型的安全协议反例的自动构造
www.ilib.cn
8.
A Mixed Formal Analysis Technology of Security Protocols
一种混合的安全协议形式化分析技术
www.ilib.cn
9.
A Non-Monotonic Logic for the Analysis of Security Protocols
一个面向安全协议分析的非单调逻辑
www.ilib.cn
10.
Some potential attacks in security protocols
安全协议中的潜在攻击
www.ilib.cn
1.
Design and Logical Analysis of Security Protocols
安全协议的设计与逻辑分析
www.ilib.cn
2.
Cross-Tree: A Date Structure for Analysis of Security Protocols
交叉树:一种用于安全协议分析的数据结构
www.ilib.cn
3.
Analysis of security protocols and attacks in network
安全协议和网络攻击分析
service.ilib.cn
4.
Review of security protocols and their formal analysis
安全协议及其形式化分析研究
www.ilib.cn
5.
A new model for analyzing security protocols formally
一种形式化分析安全协议的新模型
service.ilib.cn
6.
A New Approach for the Analysis of Security Protocols
一种新的安全协议验证方法
service.ilib.cn
7.
A Diagram of Strand Spaces for Security Protocols
安全协议的串空间图表示
www.ilib.cn
8.
Analysis and Verification of Security Protocols Based on Process Algebra
基于进程代数的安全协议分析与验证
service.ilib.cn
9.
Formal Analysis for Network Security Protocols Based on Trace Semantics
基于迹语义的网络安全协议形式化分析
ilib.cn
10.
A Formal Model and Algorithm for Verifying Security Protocols Based on Strand Spaces
基于串空间的安全协议形式化验证模型及算法
www.ilib.cn
1.
Taxonomy of Replay Attacks on Security Protocols Based on Attack Hierarchy
基于攻击层次的重放攻击分类
www.ilib.cn
2.
Analysis of Security Protocols Based on Authentication Test
基于认证测试的安全协议分析
service.ilib.cn
3.
Verifying Security Protocols Based on Logic Program
基于逻辑程序的安全协议验证
www.ilib.cn
4.
Towards Analyzing Some Kinds of Critically Formal Models for Network Security Protocols
对几类重要网络安全协议形式模型的分析
www.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2024/12/26 1:58:05