您要查找的是不是:
- In the field of network security communications, the applications of chaos theory have already stridden forward to the practical stage. 混沌理论在网络保密通信领域中的应用已经向着实用化阶段迈进。
- IPsec is a framework of open standards that helps ensure private, secure communications over IP networks by using cryptographic security services. IPsec是开放标准的框架,它可以帮助确保通过使用加密安全服务在IP网络上建立专用的安全通信。
- Frequency-hopping spread spectrum (FHSS) was developed by the military for secure communications. 跳频扩频(FHSS)是由军方为保密通信开发的。
- Secure communications method for higher power information signal based on chaotic masking is proposed. 摘要提出了一种适合较大功率信息信号的混沌掩盖通信方法。
- Secure Sockets Layer (SSL) is a method for securing communications between a client and a server. 安全套接字层(SSL)是确保客户端与服务器之间通信安全的一种方法。
- GSI provides the authentication, authorization, and secure communications as described above. 如上所述,GSI提供了认证、授权以及安全的通信。
- The transformation of NATO from a military ally to a security community within the scope of NATO is in the interest of regional stability and security. 北约从军事联盟向北约范围内的安全共同体的转变 ,有利于地区的安全和稳定。
- Operators of its secure communications system can guide friendly aircraft against enemy planes. 其安全系统的操作者能导引友机对抗敌机。
- Build the equipment remoteness maintenance system with authorization control and security communication on the grid and solve th... 用网格技术建立具有授权控制和安全通信能力的装备远程保障系统,解决了装备远程保障中的信息安全问题。
- It can be applied to many domains such aswireless communications, VoIP, secure communications. 它在无线通信,IP电话,保密通信等诸多领域具有重要应用。
- The specific implementation of all these layers and the security communication mechanism among all these components are described. 然后描述了各个层次的具体实现方案以及各个组件之间的安全通信机制。
- Certificates are also used for authentication and encryption to help secure communications between a Client Access server and clients. 证书还可用于身份验证和加密,以帮助保护客户端访问服务器与客户端之间的通信。
- Abstract: In this paper, we present a series of important applications of blind signature to computer security communication, especially to electronic voting and electronic cash. 文摘:根据近年来国内外关于数字签名的研究背景及进展,阐述盲签名在计算机保密通信,特别是在电子货币等方面的一系列重要应用。
- From Tampa, the Predator picture was relayed through the American secure communications network to the CIA in Langley, Virginia, and to the battle?scarred Pentagon itself. 通过美国的安全通信网,“食肉动物”侦察机把拍摄的图像从坦帕传送到中央情报局和五角大楼。
- From Tampa,the Predator picture was relayed through the American secure communications network to the CIA in Langley,Virginia,and to the battle?scarred Pentagon itself. 通过美国的安全通信网,“食肉动物”侦察机把拍摄的图像从坦帕传送到中央情报局和五角大楼。
- I'll undertake for your security. 我将保证你的安全。
- Specify how this policy responds to requests for secure communication. 指定这个策略如何对安全通讯的请求做出反应。
- In the old society we never knew real security. 在旧社会我们的生活从来没有真正的保障。
- From Tampa, the Predator picture was relayed through the American secure communications network to the CIA in Langley, Virginia, and to the battle scarred Pentagon itself. 通过美国的安全通信网,“食肉动物”侦察机把拍摄的图像从坦帕传送到中央情报局和五角大楼。
- Provide the means for secure communication between all computer on the network. 在网络上所有的计算机之间提供安全通信工具。