您要查找的是不是:
- security protocols design 安全协议设计
- The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design. 摘要密码协议分析与设计的基础是对其进行形式化建模。
- Has the organisation implemented effective information security protocols? 公司有否推行有效的资料保安管理措施?
- It can implement some security protocol -such as IPSec, PPTP, SSL, IKE. 它可以代替软件来实现一些安全通讯协议,如IPSec,PPTP,SSL,IKE等等。
- Some classic protocols, especially protocols with KDC model,are discussed. And several skills are summatized to apply in our protocol design. 在对现存的各种集中式密钥分配协议进行总结基础上,重点研究了KDC 模式下的密钥分配协议设计,总结了协议设计中的一些技巧。
- IPsec uses cryptography-based protection services, security protocols, and dynamic key management. IPsec使用基于加密的保护服务、安全协议和动态密钥管理。
- Realization of LOTOS formal specification is one of indispensable steps in protocol design. LOTOS形式规范的目标实现是协议设计中必不可少的阶段之一。
- He is also concerned with the verification of security protocols through semantic formalisms and type checking. 他关注的领域还有通过语义形式和类型检查对安全性协议进行验证。
- In this paper, the application of LOTOS technology in network communication protocol design is studied. 本文对LOTOS技术在网络通信协议设计中的应用方法进行了研究。
- Athena approach can not analyze some complex security protocols because of their poor cryptographic primitives. Athena分析方法由于没有抽象更多的密码学原语,因此不能分析较复杂的安全协议。
- One key factor that prevents widespread adoption of IPMI is its lack of support for enterprise security protocols. 一个阻碍广泛采用IPMI的关键因素是缺乏对企业安全协议的支持。
- Based on USB 1.1, the protocol design for LEX and REX is chiefly discussed, and the source code in Verilog and its simulation results are also given. 文章依据USB1.;1协议,重点讨论了LEX和REX端协议部分的设计,给出了用Verilog语言实现的源程序和仿真结果。
- On the Networking tab, you can change the type of secure protocol. 在网络选项卡上,您可以更改安全协议的类型。
- Transport Layer Security (TLS) is an industry standard protocol designed to help protect the privacy of information communicated over the Internet. 传输层安全性(TLS)是一种行业标准协议,旨在帮助保护通过Internet通信的信息的隐私。
- This is part of our security protocol to avoid Double claiming or unscrupulous acts by participants Of this program. 这些是我们安全条例的一部分,防止参与者重复领奖或无理行为。
- In LEO satellite networks with inter-satellite links, the highly dynamic topology and the limited on-board resources pose special challenges to routing protocol design. 在具有星际链路的低地球轨道(LEO)卫星网络中;高度动态的网络拓扑和受限的星上资源为其路由协议设计带来很大的挑战.
- Typical examples include logging data about the request or response, processing security protocols, managing session attributes, and more. 典型的例子包括记录关于请求和响应的数据、处理安全协议、管理会话属性,等等。
- The approvers must include at a minimum the Plant Quality Assurance Manager (or delegate).The approver must review the document versus the protocol design and acceptance criteria. 在验证完成后,复核人负责检查根据验证数据得出的结论是正确以及验证是否符合验收标准。
- The passcode is 1234?! Passcodes like that are in direct violation of Code 12 of the UAC Security Protocol Handbook! 密码是1234?像这样的密码简直就是直接违反UAC安全议定手册上的第12号法规嘛!
- After that,starting with the access control of resources,the security of Net Disk for distance education is highly improved by SSL security protocols. 在此基础上,从对资源的访问控制着手,通过SSL安全协议大大提高了远程教育网络硬盘系统的安全性。