您要查找的是不是:
- Has the organisation implemented effective information security protocols? 公司有否推行有效的资料保安管理措施?
- It can implement some security protocol -such as IPSec, PPTP, SSL, IKE. 它可以代替软件来实现一些安全通讯协议,如IPSec,PPTP,SSL,IKE等等。
- IPsec uses cryptography-based protection services, security protocols, and dynamic key management. IPsec使用基于加密的保护服务、安全协议和动态密钥管理。
- He is also concerned with the verification of security protocols through semantic formalisms and type checking. 他关注的领域还有通过语义形式和类型检查对安全性协议进行验证。
- Athena approach can not analyze some complex security protocols because of their poor cryptographic primitives. Athena分析方法由于没有抽象更多的密码学原语,因此不能分析较复杂的安全协议。
- One key factor that prevents widespread adoption of IPMI is its lack of support for enterprise security protocols. 一个阻碍广泛采用IPMI的关键因素是缺乏对企业安全协议的支持。
- The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design. 摘要密码协议分析与设计的基础是对其进行形式化建模。
- On the Networking tab, you can change the type of secure protocol. 在网络选项卡上,您可以更改安全协议的类型。
- This is part of our security protocol to avoid Double claiming or unscrupulous acts by participants Of this program. 这些是我们安全条例的一部分,防止参与者重复领奖或无理行为。
- Typical examples include logging data about the request or response, processing security protocols, managing session attributes, and more. 典型的例子包括记录关于请求和响应的数据、处理安全协议、管理会话属性,等等。
- The passcode is 1234?! Passcodes like that are in direct violation of Code 12 of the UAC Security Protocol Handbook! 密码是1234?像这样的密码简直就是直接违反UAC安全议定手册上的第12号法规嘛!
- After that,starting with the access control of resources,the security of Net Disk for distance education is highly improved by SSL security protocols. 在此基础上,从对资源的访问控制着手,通过SSL安全协议大大提高了远程教育网络硬盘系统的安全性。
- Guttman, the other is Athena which is a new efficient automated approach for security protocol proposed by D. Song. 其二是Song在串空间模型上提出的Athena方法。
- The Security protocols include IPSec for Internet layer,TLS and SSL for transport layer,S-HTTP,SET and S/MIME for application layer. 应用层的S-HTTP,SET,S/MIME。
- Which wireless security protocol cannot use digital certificates for both the supplicant and authentication server? 下列哪个无线网路安全协定无法在用户端与验证伺服器上使用数位凭证??
- Experimental result shows that the tool can simplify the proving process,and improve the efficiency of security protocols verification. 实现结果表明,该工具简化了安全协议的证明过程,提高了效率,具有较好的实用性。
- Experimental result shows that the tool can simplify the proving process, and improve the efficiency of security protocols verification. 实现结果表明,该工具简化了安全协议的证明过程,提高了效率,具有较好的实用性。
- The Kerberos authentication protocol is a security protocol that verifies data to help ensure that both user and network services are safe. Kerberos身份验证协议是一种安全协议,用于验证数据以帮助确保用户和网络服务均是安全的。
- Using JXTA Security protocol to protect information security of the system offers the system a good safety, reliability and robustness. 应用JXTA的安全协议保障系统信息安全,使该系统具有良好的安全性、可靠性及鲁棒性。
- We presented a Security Protocol for Ubiquitous Environments (SPUE), which provided data authentication, and data freshness besides unobtrusiveness. 它满足数据认证、数据新鲜性等安全特性,同时满足普适计算的“ 无需人干预的”性质。