单词 | security protocols | ||||||
释义 | security protocols
例句释义: 安全协议,安全协定,定书 1. Thomas, passive RFID tags is very easy to counterfeit, because they do not contain the traditional encryption and security protocols. Thomas教授称,无源RFID标签很容易伪造,因为它们不含有传统的加密算法和安全协议。 www.bing.com 2. This paper proposes a non-monotonic logic which can be used to analyze the properties of security protocols. 本文提出一种对安全协议进行分析的非单调逻辑。 www.dictall.com 3. Experimental result shows that the tool can simplify the proving process, and improve the efficiency of security protocols verification. 实现结果表明,该工具简化了安全协议的证明过程,提高了效率,具有较好的实用性。 211.151.93.212 4. Several XML security protocols have been proposed to support communication data security in XML applications. 已提出了几个XML安全性协议以在XML应用程序中支持通信数据安全性。 www-128.ibm.com 5. This pattern would support a wide range of incoming security protocols while simplifying security in other ESB components. 此模式将支持各种传入安全协议,而且同时能简化其他ESB组件中的安全措施。 www.ibm.com 6. The Negotiate protocol selects either NTLM or Kerberos depending on the security protocols supported by the client and server. 协商协议可以选择NTLM或Kerberos,具体选择哪一个取决于客户端和服务器所支持的安全协议。 msdn2.microsoft.com 7. Data Security Technology, data security protocols and P2P technology are the effective measures for Online Privacy protection. 网络信息安全技术、信息安全协议、P2P技术成为网络隐私安全保护的有效手段。 lib.cqvip.com 8. IPsec uses cryptography-based protection services, security protocols, and dynamic key management. IPsec使用基于加密的保护服务、安全协议和动态密钥管理。 technet.microsoft.com 9. Implement control and maintain all Bio-security protocols for the breeding area of the farm. 负责海波尔的各项生物安全制度在本区内的执行。 www.rencai.net 10. Has the organisation implemented effective information security protocols? 公司有否推行有效的资料保安管理措施? www.icac.org.hk 1. One key factor that prevents widespread adoption of IPMI is its lack of support for enterprise security protocols. 一个阻碍广泛采用IPMI的关键因素是缺乏对企业安全协议的支持。 www.ebigear.com 2. And implement the Negotiate and Secure Sockets Layer security protocols, respectively. 继承,并分别实现协商安全协议和安全套接字层安全协议。 msdn2.microsoft.com 3. Displayed within the address field if current page uses security protocols. 如果当前页面使用了安全协议,则在地址栏中显示此图标。 help.opera.com 4. Security protocols for EAI applications are more mature those for Web services. EAI应用程序的安全协议相对于Web服务要成熟的多。 www-128.ibm.com 5. Typical examples include logging data about the request or response, processing security protocols, managing session attributes, and more. 典型的例子包括记录关于请求和响应的数据、处理安全协议、管理会话属性,等等。 www.ibm.com 6. It is designed to create a separation of concerns between application protocols and security protocols. 它用于创建应用程序协议和安全协议之间的分离关系。 www.ibm.com 7. All of the above security protocols can bind to Web services messaging protocols. 所有上述安全性协议都可以绑定到Web服务消息传递协议。 www-128.ibm.com 8. Your busted, tired dance moves are no match for my security protocols. 你那徒劳无用的舞步完全不是我的安全协议的对手 www.tingroom.com 9. People get excited about security protocols and stuff like that. 人们总是对安全协议或类似的内容更感兴趣。 www-128.ibm.com 10. The supported security protocols are specified when the. 时指定受支持的安全协议。 msdn2.microsoft.com 1. He is also concerned with the verification of security protocols through semantic formalisms and type checking. 他关注的领域还有通过语义形式和类型检查对安全性协议进行验证。 www.ibm.com 2. Using these settings requires a knowledge of security protocols. 要使用这些设置需要有安全协议的知识。 angel.w15.5tom.cn 3. It can also be interconnected with SIVEs located in adjoining provinces, thus facilitating control and the setup of security protocols. 它也可以连接毗邻的SIVE系统,从而利于控制和设置安全协议。(工业和信息化部电子科学技术情报研究所陈皓) www.etiri.com.cn 4. The formal method is useful to analyze and verify security protocols. It can uncover bugs which are difficult to find by testing. 采用形式化方法建模和验证安全协议可以检测到传统测试手段难以发现的错误。 www.joces.org.cn 5. Increase flexibility with an architecture that supports all major security protocols - including SSL, TLS, IPSec, ETS, and DRM 使用支持所有主要安全协议(包括SSL、TLS、IPSec、ETS和DRM)的体系结构增强灵活性 www.certicom.com 6. See how the upcoming Web services security protocols work - read the WS-Security Profile for XML-based Tokens 请了解即将出现的Web服务安全性协议的工作原理请在 www-128.ibm.com 7. Auto-Transformation of the Process Algebra Specification of Security Protocols into Logic Programs 安全协议的进程代数规约到逻辑程序的自动转换 service.ilib.cn 8. Summarization on Security Protocols Formalization 安全协议的形式化方法概述 www.ilib.cn 9. Analysis and comparison of two network security protocols 两种网络安全协议分析与比较 ilib.cn 10. Formal Verification Techniques for Security Protocols 安全协议中的形式化验证技术 www.ilib.cn 1. The Approaches and Technologies for Formal Verification of Security Protocols 安全协议的形式化分析技术与方法 www.ilib.cn 2. Analysis of correspondence property for security protocols 安全协议关联性分析 www.ilib.cn 3. Security measures the adherence to security protocols and mechanisms 安全性测量对安全协议和安全机制的遵从性 www-128.ibm.com 4. Study and implementation of security protocols for wireless local network 无线局域网安全协议的研究和实现 www.ilib.cn 5. Ford describes the security protocols attached to the new feature, writing 福特并描述了WPA2无线网络的安全特性 www.cnbeta.com 6. Research on Security Protocols of Quantum Cryptography 量子密码学安全协议的研究 ilib.cn 7. Formal Specification of Security Protocols 安全协议的形式化规范 ilib.cn 8. Internet security protocols and related analysis 安全协议与分析 zhidao.baidu.com 9. Analyzing methods for security protocols combined with the logic of BAN and the space of string BAN逻辑与串空间相结合的安全协议分析方法 service.ilib.cn 10. Research on Security Protocols of Capacity Allocation in Supply Chain 基于供应链容量分配中的安全契约研究 www.ilib.cn 1. Formal Description and Analysis of Security Protocols 安全协议的形式化描述和分析 www.ilib.cn 2. Combined Analysis Method for Security Protocols 一种安全协议组合分析方法 www.ilib.cn 3. Using Types for the Verification of Security Protocols 基于类型理论的安全协议验证技术 service.ilib.cn 4. A Security Protocols'Analytic Approach of Reconciling Two Views 一种调和两种观点的安全协议分析法 www.ilib.cn 5. A New Taxonomy of Attacks on Security Protocols and Their Security Evaluation 安全协议的攻击分类及其安全性评估 www.ilib.cn 6. Survey on Theories and Methods of Formal Analyses for Security Protocols 安全协议形式化分析理论与方法研究综述 www.ilib.cn 7. Automatically Constructing Counter-Examples of Security Protocols Based on the Extended Horn Logic Model 基于Horn逻辑扩展模型的安全协议反例的自动构造 www.ilib.cn 8. A Mixed Formal Analysis Technology of Security Protocols 一种混合的安全协议形式化分析技术 www.ilib.cn 9. A Non-Monotonic Logic for the Analysis of Security Protocols 一个面向安全协议分析的非单调逻辑 www.ilib.cn 10. Some potential attacks in security protocols 安全协议中的潜在攻击 www.ilib.cn 1. Design and Logical Analysis of Security Protocols 安全协议的设计与逻辑分析 www.ilib.cn 2. Cross-Tree: A Date Structure for Analysis of Security Protocols 交叉树:一种用于安全协议分析的数据结构 www.ilib.cn 3. Analysis of security protocols and attacks in network 安全协议和网络攻击分析 service.ilib.cn 4. Review of security protocols and their formal analysis 安全协议及其形式化分析研究 www.ilib.cn 5. A new model for analyzing security protocols formally 一种形式化分析安全协议的新模型 service.ilib.cn 6. A New Approach for the Analysis of Security Protocols 一种新的安全协议验证方法 service.ilib.cn 7. A Diagram of Strand Spaces for Security Protocols 安全协议的串空间图表示 www.ilib.cn 8. Analysis and Verification of Security Protocols Based on Process Algebra 基于进程代数的安全协议分析与验证 service.ilib.cn 9. Formal Analysis for Network Security Protocols Based on Trace Semantics 基于迹语义的网络安全协议形式化分析 ilib.cn 10. A Formal Model and Algorithm for Verifying Security Protocols Based on Strand Spaces 基于串空间的安全协议形式化验证模型及算法 www.ilib.cn 1. Taxonomy of Replay Attacks on Security Protocols Based on Attack Hierarchy 基于攻击层次的重放攻击分类 www.ilib.cn 2. Analysis of Security Protocols Based on Authentication Test 基于认证测试的安全协议分析 service.ilib.cn 3. Verifying Security Protocols Based on Logic Program 基于逻辑程序的安全协议验证 www.ilib.cn 4. Towards Analyzing Some Kinds of Critically Formal Models for Network Security Protocols 对几类重要网络安全协议形式模型的分析 www.ilib.cn |
||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。