您要查找的是不是:
- This paper makes a summary of seurity of protocols and formal method in chapter 2.Strand Space, brought forward by Fabrega, Herzog and Guttman, is a applied, intuitionistic and strict formal method for security protocols analysis. 串空间(STRAND SPACE)模型由Fabrega, Herzog和Guttman三人提出,是分析安全协议的一种实用、直观和严格的形式化方法。
- Strand Spaces Some Bounds on Security Protocol Analysis--Combining Model Checking and Strand Spaces 安全协议分析的界--综合模型检查与
- security protocol analysis 安全协议分析
- Gigabit Ethernet protocol analysis of Architecture and advantages. 千兆以太网的协议体系结构及其对他的优势分析.
- It can implement some security protocol -such as IPSec, PPTP, SSL, IKE. 它可以代替软件来实现一些安全通讯协议,如IPSec,PPTP,SSL,IKE等等。
- This is part of our security protocol to avoid Double claiming or unscrupulous acts by participants Of this program. 这些是我们安全条例的一部分,防止参与者重复领奖或无理行为。
- The Protocol Analysis agent is the underlying agent that implements the sender reputation functionality. 协议分析代理是实现发件人信誉功能的基本代理。
- The Protocol Analysis agent is used by the Sender Reputation feature in Exchange 2007. 协议分析代理供Exchange 2007中的发件人信誉功能使用。
- The passcode is 1234?! Passcodes like that are in direct violation of Code 12 of the UAC Security Protocol Handbook! 密码是1234?像这样的密码简直就是直接违反UAC安全议定手册上的第12号法规嘛!
- Guttman, the other is Athena which is a new efficient automated approach for security protocol proposed by D. Song. 其二是Song在串空间模型上提出的Athena方法。
- Based on LAN's CSMA/CD protocol analysis, the user oriented availability model of Ethernet is put forward. 基于计算机以太网CSMA/CD协议,面向用户探讨以太网可用度模型。
- On the Networking tab, you can change the type of secure protocol. 在网络选项卡上,您可以更改安全协议的类型。
- Which wireless security protocol cannot use digital certificates for both the supplicant and authentication server? 下列哪个无线网路安全协定无法在用户端与验证伺服器上使用数位凭证??
- The Protocol Analysis agent uses this data and input from the Content Filter agent to compute a sender reputation level (SRL) for senders. 协议分析代理使用此数据和来自内容筛选器代理的输入值来计算发件人的发件人信誉级别(SRL)。
- Since encryption typically makes management tasks -- such as protocol analysis -- problematic, the ability to selectively secure transmissions is a bonus. 由于加密通常使管理任务(如协议分析)变得有问题,所以有选择地加密传输的能力成了一种额外的好处。
- The Kerberos authentication protocol is a security protocol that verifies data to help ensure that both user and network services are safe. Kerberos身份验证协议是一种安全协议,用于验证数据以帮助确保用户和网络服务均是安全的。
- JTAG protocol analysis software, with Zhou meritorious LA1032 logic analyzer use, can observe various JTAG Emulator for the communication process. JTAG协议分析软件;配合周立功的LA1032逻辑分析仪使用;可以观察各种JTAG仿真器的通信过程.
- Using JXTA Security protocol to protect information security of the system offers the system a good safety, reliability and robustness. 应用JXTA的安全协议保障系统信息安全,使该系统具有良好的安全性、可靠性及鲁棒性。
- Listening LAN password, docking received packet further analysis, the application layer protocol analysis, access to the password. 侦听局域网内的密码,对接收到的封包进一步分析,解析出应用层协议,获得密码。
- We presented a Security Protocol for Ubiquitous Environments (SPUE), which provided data authentication, and data freshness besides unobtrusiveness. 它满足数据认证、数据新鲜性等安全特性,同时满足普适计算的“ 无需人干预的”性质。