您要查找的是不是:
- Trusted Computing Terminal Based On TCG 基于TCG构建的可信计算终端
- Trusted Computing Terminal 可信计算终端
- How Trustworthy Is Trusted Computing? 可信计算有多可信赖?
- The data will be fed into the computer terminal. 数据将输入电脑终端。
- Cybersecurity and Domestic Surveillance or Why Trusted Computing Shouldn't Be? 数字安全与国内监督,或为何原本可信的计算机面目全非?
- Lev has also worked in the areas of application security and trusted computing. Lev也从事于应用程序安全和可信的计算方面的研究。
- A set of keys, as on a computer terminal, word processor, typewriter, or piano. 键盘一系列键,如计算机终端设备、文字处理机、打字机或钢琴上
- The data will be fed into a computer terminal. 这些资料将被输入计算机终端。
- Therefore, she has a computer terminal with a CRT. 所以,她用的电脑终端是一个显示器。
- Trusted Computing is one of the hottest topics in the information security field. 可信计算是目前信息安全领域研究的热点问题之一。
- Private computers are also known as trusted computers. 私人计算机也称为受信任的计算机。
- The operator keys the facts into the computer terminal. 话务员把这些情况键入计算机终端。
- With the technique of trusted computing,dsigned and implemented the mechanism of resisting malic... 利用可信计算技术设计并实现恶意代码防御机制。
- Bank transactions can be done via a computer terminal. 银行业务可以通过一个电脑的终端来办理。
- We first introduced the TPM hardware structure, several focus points of Trusted Computing and HMAC and SHA-1 algorithms. 文章首先介绍了可信计算若干关键技术、TPM硬件结构以及HMAC、SHA-1算法。
- An area, as in an office, outfitted with equipment and furnishings for one worker, often including a computer or computer terminal. 工作站为一个工作者装备了设备和家俱一个区域,如在办公室里,经常包括计算机或计算机终端
- Trusted computing in this form is the ultimate reversal of the human-centric, loosely-coupled design approach of the Internet. 这种形式的可信任计算完全反转了以人为中心、松散结合的互联网设计理念。
- The difference of MTM and TPM on the security model is compared,then the process implementing trusted computing is given. 比较了MTM和TPM在安全模型上的区别,给出了实现可信机制的过程。
- The modem is broken so we cannot access any other computer terminal. 调制解调装置出故障了,所以我们无法访问其他电脑终端机。
- One of the Trusted Computing Group(TCG) infrastructure is credential system,which participates in trusted chain of transmission process. 证书体系在可信计算中具有基础支撑作用,它参与完成了信任传递的整个过程。