网站首页  词典首页

请输入您要查询的英文单词:

 

单词 trusted computing
释义

trusted computing

  • 网络可信计算;可信赖计算;可信赖运算
1.
可信计算
可信计算Trusted Computing)是在计算和通信系统中广泛使用基于硬件安全模块支持下的可信计算平台,以提高系统整体的 …
baike.baidu.com
2.
可信赖计算
微星785G主... ... Inter leave Ratio: 交错比例。 4-5、Trusted computing可信赖计算。 Primary Graphic`s Adapter: 初始 …
iyanzhao.com
3.
可信赖运算
可信赖运算(Trusted Computing)表示我们使用可信赖系统后,可以完全信赖他,不必再担心安全的问题…"A 'trusted' computer …
nextplayer.pixnet.net
4.
可信计算技术
...不是证明BitLocker技术存在漏洞,也不是证明可信计算技术Trusted Computing)毫无价值。BitLocker与其他磁盘加密技术 …
www.hackbase.com
5.
可信赖的计算
可信赖的计算”(Trusted computing)将可能使它变得普遍。 “背判了的计算”是一个较为合适的名称, 因为这项打算是设计用 …
www.gnu.org
6.
信任运算
... 电子设备 — 例如剥夺消费者 开机自主权 的 「信任运算」 (trusted computing) Windows 8 电脑, 又例如 言论管制行之已久 …
pansci.tw
7.
可信赖计算技术
...chine-to-machine;M2M)通讯以及可信赖计算技术(trusted computing)。
www.stmcu.org

例句

释义:
1.
Analysis shows that this program has important reference value in the terminal trusted computing security research.
分析认为,该方案对可信计算在终端安全方面的研究有着重要的参考价值。
stae.com.cn
2.
Trusted computing fully absorbed this idea, and was applied to a computer in the world.
可信计算充分吸收了这种理念,并将其运用到计算机世界当中。
www.bing.com
3.
Finally we note that trusted computing has been the subject of a considerable amount of criticism.
最后,我们主要到可信计算处理器已经成为一门广为批评的话题。
www.bing.com
4.
Trusted computing in this form is the ultimate reversal of the human- centric , loosely-coupled design approach of the Internet.
这种形式的可信任计算完全反转了以人为中心、松散结合的互联网设计理念。
dictsearch.appspot.com
5.
China still belongs to the trusted computing start-up stage, is to a higher level development.
中国的可信计算还属于起步阶段,但正在向更高水平发展。
www.bing.com
6.
Moreover, many government departments have approved products, and will have trusted computing chip product sourcing writing to tender.
而且,不少政府部门已经认可产品,并将带有可信计算芯片的产品采购写入标书。
www.bing.com
7.
And the Trusted Computing Group is still in the early development phase.
而“可信赖计算组织”也仍处于早期开发阶段。
dream4ever.org
8.
It adopts techniques of trusted computing platform, and asserts the process's trust by measuring integrity of its codes and data.
该方法采用可信计算平台技术,通过度量进程代码和数据的完整性断定其信任性。
www.ceps.com.tw
9.
With the technique of trusted computing, designed and implemented the mechanism of resisting malicious code.
利用可信计算技术设计并实现恶意代码防御机制。
www.ceps.com.tw
10.
Rise of the research of trusted computing provides a good idea to solve security management of critical data.
可信计算的研究兴起为我们解决重要数据的安全管理提供了好的解决思路。
www.zidir.com
1.
Trusted computing solution is from the origin of information security problems, is to issue "pass" .
可信计算则是从本源上解决信息安全问题,就是要发放“通行证”。
www.bing.com
2.
Identity management must evolve for the cloud to become a trusted computing platform.
云端的身份管理还需要进化,才能够成为一个值得信赖的计算平台。
www.infoq.com
3.
Trusted computing enhances computer systems'security by adding some module on both software and hardware.
可信计算通过在软件和硬件上增加一些组件来增加计算机系统的可信赖性。
www.boshuo.net
4.
China also introduced its own standard for chips that secure critical data in computers, called the trusted computing module (TCM).
中国还为保护电脑关键数据的芯片推出了自己的标准——可信计算模块(TCM)。
www.ftchinese.com
5.
Finally, we suggest a roadmap of trusted computing standard specifications.
最后,提出了我国可信计算标准路线图制定的建议。
www.lunwenchina.net.cn
6.
The Trusted Measurement Mechanism is the core and basis of Trusted Computing.
可信度量机制是可信计算技术的核心与关键。
www.dictall.com
7.
The security model is the core content in the trusted information system and the key field of the trusted computing research.
安全模型既是可信信息系统的核心内容,也是可信计算研究的重要领域。
www.dictall.com
8.
Lev has also worked in the areas of application security and trusted computing.
Lev也从事于应用程序安全和可信的计算方面的研究。
www-128.ibm.com
9.
How Trustworthy Is Trusted Computing ?
可信计算有多可信赖?。
www.bing.com
10.
This paper presented a trusted computing platform model based on existing computer network.
提出了一种基于现有计算机网络的可信计算平台模型。
www.ceps.com.tw
1.
The hot Point of Security Turns to "Trusted Computing"
安全热点转向“可信计算”
www.ilib.cn
2.
A new way to realize Trusted Computing Technology ?
提出并实现了一个可信计算技术的新方法
wenku.baidu.com
3.
Study of Trusted Computing and Its Development
可信计算的研究及其发展
www.ilib.cn
4.
First, the paper studies the key management mechanisms of the existing Trusted Computing Platform;
本文首先研究现有的可信计算平台的密钥管理机制;
www.fabiao.net
5.
E-signature; Trusted Cryptography Module; Trusted computing; Embedded system;
电子签名;可信密码模块;可信计算;嵌入式;
www.zidir.com
6.
Analysis of Key Technology in Trusted Computing Platform and Its Application
可信赖计算平台关键技术分析及应用
www.ilib.cn
7.
P2P network; Security; Trusted computing; Ring signature; Remote; attestation; Automated trust negotiation;
P2P网络;安全机制;可信计算;环签名;远程证明;自动信任协商;
www.zidir.com
8.
Research Of Security Architecture And Application Of Trusted Computing Platform
可信计算平台安全体系及应用研究
www.ilib.cn
9.
Research and Implementation of Maintenance on Trusted Computing Platform
可信计算平台数据维护技术的研究与实现
www.ilib.cn
10.
Trusted computing platform and its current research
可信计算平台及其研究现状
service.ilib.cn
1.
The Design And Implementation Of Management Center Of Trusted Computing Platform
可信计算平台管理中心的设计与实现
www.ilib.cn
2.
Research on Policy Control System Under Trusted Computing Environment
可信计算环境下策略控制系统的研究
www.ilib.cn
3.
Trusted Execution environment over Trusted Computing Base
可信执行环境与可信计算基础之比较
www.ibm.com
4.
Research on secure protocol and key management of trusted computing technology
可信计算技术安全协议与密钥管理研究
168.160.184.82:8080
5.
Trusted Computing Architecture in Information System
信息系统的可信计算体系
www.ilib.cn
6.
Trusted Computing-Based Security Model for Software Protection
支持可信计算的软件保护模型
service.ilib.cn
7.
Digital Forensics of Trusted Computing Environment
可信计算环境中的数字取证
www.ilib.cn
8.
Trusted computing research on computer security problems
针对安全问题的可信计算研究
www.ilib.cn
9.
Study and Application of Trusted Computing Technology
可信计算技术的研究与应用
service.ilib.cn
10.
Realization of Trusted Computing Platform
可信安全计算平台的一种实现
ilib.com.cn
1.
Theory and Application of Trusted Computing Platform
可信计算平台的工作原理与应用研究
service.ilib.cn
2.
Trusted Computing Applying of Network Security
可信计算技术在网络安全中的应用
service.ilib.cn
3.
Trusted computing base of computer information system
计算机信息系统可信计算基
www.chinays.gov.cn
4.
Application of trusted computing compliance in VPN
可信计算在VPN中的应用
www.ilib.cn
5.
Design of Remote Communication in Substation Automation Based on Trusted Computing Method
基于可信计算方法的变电站自动化远程通信设计
www.ilib.cn
6.
Implementation of Trusted Computing in Commercial Cryptogram Based on Hardware
基于硬件系统的商用密码可信计算实现方法
www.ichacha.net
7.
Research and application of architecture based on trusted computing platform
基于可信计算平台的体系结构研究与应用
www.ilib.cn
8.
Research and Development on the Secure Architecture of Terminal Based on Trusted Computing
基于可信计算的终端安全体系结构研究与进展
www.ilib.cn
9.
Key Management in the Platform of Trusted Computing
可信计算平台中的密钥管理
service.ilib.cn
10.
Development of Trusted Computing Research
可信计算研究进展
service.ilib.cn
1.
Research and Development of Trusted Computing
可信计算研究的初步探疑
www.ilib.cn
2.
Safe Financial Tax Controlling System Based on Trusted Computing Theory
基于可信计算理论的金融税控收款安全体系
scholar.ilib.cn
3.
The Research on Constructing a Network Based on Trusted Computing
构建可信计算网络的研究
168.160.184.82:8080
4.
Things Information Transport Ptotocol for IOT Based on Trusted Computing
基于可信计算的物联网物品信息传输协议
wenku.baidu.com
5.
Trusted Computing Terminal Based On TCG
基于TCG构建的可信计算终端
www.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/2/28 0:40:25