您要查找的是不是:
- trusted computing module 可信计算模块
- How Trustworthy Is Trusted Computing? 可信计算有多可信赖?
- Although the Trusted Computing Group (TCG) has defined specifications for Trusted Computing, including those of Trusted Platform Module (TPM), criteria on compliance testing is still not available. 目前TCG尽管已经发布了可信计算的相关标准,但是缺乏标准符合性验证的规范。
- Cybersecurity and Domestic Surveillance or Why Trusted Computing Shouldn't Be? 数字安全与国内监督,或为何原本可信的计算机面目全非?
- Lev has also worked in the areas of application security and trusted computing. Lev也从事于应用程序安全和可信的计算方面的研究。
- This paper comes up with an on-board computer module based on ETX. 本文介绍了一种基于ETX的车载计算机模块的设计。
- Trusted Computing Platform Module (TPM) 可信计算平台模块
- For ease of implementation, a transputer-based computing module and input-output module, and PC host server program were designed and developed. 首先根据交流感应伺服驱动系统的需求,设计两种电路板模组:计算 模组和输出入界面模组;
- Private computers are also known as trusted computers. 私人计算机也称为受信任的计算机。
- Trusted Computing is one of the hottest topics in the information security field. 可信计算是目前信息安全领域研究的热点问题之一。
- With the technique of trusted computing,dsigned and implemented the mechanism of resisting malic... 利用可信计算技术设计并实现恶意代码防御机制。
- We first introduced the TPM hardware structure, several focus points of Trusted Computing and HMAC and SHA-1 algorithms. 文章首先介绍了可信计算若干关键技术、TPM硬件结构以及HMAC、SHA-1算法。
- Trusted computing in this form is the ultimate reversal of the human-centric, loosely-coupled design approach of the Internet. 这种形式的可信任计算完全反转了以人为中心、松散结合的互联网设计理念。
- From view of design of experiment, the random simulation of interior ballistics repetition is done using the interior ballistic computing module developed by the dynamic simulation software-ADAMS. 从试验设计角度出发,借助动力学仿真软件ADAMS开发的内弹道计算模块,对内弹道循环进行了随机模拟。
- The difference of MTM and TPM on the security model is compared,then the process implementing trusted computing is given. 比较了MTM和TPM在安全模型上的区别,给出了实现可信机制的过程。
- In order to predigest the procedure of the protocol controller"s parameters configuration, the test application program provides the special computing module for the configuration parameters. 此外,为了简化专用协议控制器参数的配置过程,测试应用程序还提供了专门的配置参数估计模块。
- Trusted Computer System Evaluation Criteria(TCSEC), DOD5200.28-STD Dec 1985. 行政机关资讯系统安全稽核制度之研究;1996;行政院研考会编印.
- This trigger the reader to check through th-e objects the computer module has been program-mde to look for. 这时检测装置将对计算机编程的物品进行搜索。
- One of the Trusted Computing Group(TCG) infrastructure is credential system,which participates in trusted chain of transmission process. 证书体系在可信计算中具有基础支撑作用,它参与完成了信任传递的整个过程。
- The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain. 授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。