您要查找的是不是:
- Trusted Computing Platform Module (TPM) 可信计算平台模块
- Trusted computation platform 可信赖计算平台
- Analysis of Key Technology in Trusted Computing Platform and Its Application 可信赖计算平台关键技术分析及应用
- trusted computing platform 可信计算平台
- How Trustworthy Is Trusted Computing? 可信计算有多可信赖?
- What is your primary computer platform? 目前您的计算机操作平台是什么?
- Private computers are also known as trusted computers. 私人计算机也称为受信任的计算机。
- Although the Trusted Computing Group (TCG) has defined specifications for Trusted Computing, including those of Trusted Platform Module (TPM), criteria on compliance testing is still not available. 目前TCG尽管已经发布了可信计算的相关标准,但是缺乏标准符合性验证的规范。
- Cybersecurity and Domestic Surveillance or Why Trusted Computing Shouldn't Be? 数字安全与国内监督,或为何原本可信的计算机面目全非?
- Lev has also worked in the areas of application security and trusted computing. Lev也从事于应用程序安全和可信的计算方面的研究。
- TCG releases the trusted computing specification,the main idea of which is to enforce the security of the platform and the applications on it by confirming integrity of the components comprise it. 可信计算组织(TCG)提出了可信计算规范,其主要思想就是通过度量和保障组成平台的各组件的完整性来保证平台及应用的安全。
- Trusted Computer System Evaluation Criteria(TCSEC), DOD5200.28-STD Dec 1985. 行政机关资讯系统安全稽核制度之研究;1996;行政院研考会编印.
- Install your UltraLite application on your Palm device as you would any other Palm Computing Platform application. 在Palm设备上安装UltraLite应用程序,就像安装任何其它Palm计算平台应用程序一样。
- Use a standard record-based data store on a device operating the Palm Computing Platform. 在运行Palm Computing Platform的设备上使用标准的基于记录的数据存储。
- So, this dissertation uses LPC2292 of ARM chip series to construct the computer platform of the north seeker. 所以本论文采用ARM芯片LPC2292构建寻北仪的计算机平台。
- Trusted Computing is one of the hottest topics in the information security field. 可信计算是目前信息安全领域研究的热点问题之一。
- The grid computing platform allows resource discovery, resource sharing, and collaboration in a distributed environment. 网格计算平台允许在一个分布式环境中发现资源、管理数据、调度在线资源并提供安全性。
- With the technique of trusted computing,dsigned and implemented the mechanism of resisting malic... 利用可信计算技术设计并实现恶意代码防御机制。
- In addition,a P2P security computing platform is designed and implemented which used XML,SOAP in the Web Services and JXTA technology. 设计并实现了一种基于PKI技术的P2P安全计算平台。
- PIR Based on Trusted Computation 基于可信计算的PIR