您要查找的是不是:
- The Data Security Analysis of the Nonvolatile Memorizer 非易失存储器数据安全性研究
- data security analysis 数据保密分析
- In computer and data security, the person who attempts to overcome the computer or data security measures. 在计算机及数据安全学中,试图攻破计算机或数据安全措施的人。
- Tnis measure method supplies reliable data for security analysis and designing installed flange of steam turbine' s vane. 此项技术可为汽轮机叶片安装轮缘的设计和安全性分析提供可靠依据。
- Encryption is not a panacea for resolving data security problems. 加密不能彻底解决数据安全问题。
- In data security, the unauthorized acquisition of information. 数据安全学中,信息的非授权获
- Ensure that data security is the CDMS company paramountin. 保证数据安全是CDMS公司的头等大事。
- They founded RSA Data Security Inc. to commercialize their discovery. 他们成立了RSA数据安全公司,使其发明商品化。
- In data security, an attack on the security of a computer system, undertaken to test the effectiveness of the security and to highlight any areas of weakness. 在数据保密学中,对一个计算机系统的安全性的攻击,用以测试安全的有效性及暴露弱点。
- In data security, pertaining to software and hardware systems that have been designed, and verified, to avoid compromising, corrupting or denying sensitive information. 在数据安全技术领域,用于修饰或说明软件系统和硬件系统,这种系统已经设计好并进行过验证,可以避免(产生)泄露、传送出错或拒绝敏感信息。
- In data security,an unauthorized disclosure or loss of sensitive information. 数据安全中指非授权的泄露或掉失了敏感的信息。
- In data security, an unauthorized disclosure or loss of sensitive information. 数据安全中指非授权的泄露或掉失了敏感的信息。
- Finally , we give a simple security analysis of the protocol to show that it fulfils these requirements . 最后,对该协议进行了简要的安全分析,证明它能够满足这些安全要求。
- In data security,messages which are in readable forms,i.e.not encrypted. 在数据保密技术中,可读形式的即未加密的报文。同cleararea。
- We perform a security analysis and heuristically argue that the protocol obtains all desired security attributes. 随后,我们提出了第一个无证书三方密钥协商协议。
- Visual modelizaton and XML was used to build a thermo-hydraulics security analysis model library for RELAP5 programme. 摘要采用可视化建模技术及可扩展标记语言(XML),建立适用于热工水力安全分析系统程序RELAP5的组件模型库。
- In data security, the transmission of data to unauthorized users by processes with legitimate access to data. A compiler, for example, could leak a proprietary program whilst it is being compiled. 在数据保密学中,通过合法访问数据的进程将数据传输给未授权的用户的过程。例如,编译程序在编译期间便可能泄漏专用程序。
- When she arrived at Wharton, we had a desperate need for someone to teach a class in “Security Analysis”. 非但如此,作为扬州人的夏一红,皮肤黝黑,面容娇丽,还有“黑里俏”之誉。
- In general, data security and system security can be separately distinguished. 通常,数据安全和系统安全可以分开来考虑。
- In data security, messages which are in readable forms, i.e.not encrypted. 在数据保密技术中,可读形式的即未加密的报文。同cleararea。