您要查找的是不是:
- It can implement some security protocol -such as IPSec, PPTP, SSL, IKE. 它可以代替软件来实现一些安全通讯协议,如IPSec,PPTP,SSL,IKE等等。
- This is part of our security protocol to avoid Double claiming or unscrupulous acts by participants Of this program. 这些是我们安全条例的一部分,防止参与者重复领奖或无理行为。
- The passcode is 1234?! Passcodes like that are in direct violation of Code 12 of the UAC Security Protocol Handbook! 密码是1234?像这样的密码简直就是直接违反UAC安全议定手册上的第12号法规嘛!
- Guttman, the other is Athena which is a new efficient automated approach for security protocol proposed by D. Song. 其二是Song在串空间模型上提出的Athena方法。
- Which wireless security protocol cannot use digital certificates for both the supplicant and authentication server? 下列哪个无线网路安全协定无法在用户端与验证伺服器上使用数位凭证??
- On the Networking tab, you can change the type of secure protocol. 在网络选项卡上,您可以更改安全协议的类型。
- The Kerberos authentication protocol is a security protocol that verifies data to help ensure that both user and network services are safe. Kerberos身份验证协议是一种安全协议,用于验证数据以帮助确保用户和网络服务均是安全的。
- Using JXTA Security protocol to protect information security of the system offers the system a good safety, reliability and robustness. 应用JXTA的安全协议保障系统信息安全,使该系统具有良好的安全性、可靠性及鲁棒性。
- We presented a Security Protocol for Ubiquitous Environments (SPUE), which provided data authentication, and data freshness besides unobtrusiveness. 它满足数据认证、数据新鲜性等安全特性,同时满足普适计算的“ 无需人干预的”性质。
- With the widespread use of PKI technology and SSL Security protocol, by use of SSL in Web, the provision of safe data communication is very important. 随着PKI技术和SSL安全协议的广泛应用,在Web服务中利用SSL协议,提供安全的数据通信是非常重要的。
- Most experts agree that DNSSEC (DNS Security), the DNS security protocol hammered out by the IETF 10 years ago, would make DNS close to bulletproof. 多数专家同意,由IETF(因特网工程任务组)10年前提出的DNSSEC(DNS安全)协议可使DNS防止那样的攻击。
- The passcode is 1234?! Passcodes like that are in direct violation of Code 12 of the UAC Security Protocol Handbook! Doesn't anyone read the handbook anymore? 密码是1234?像这样的密码简直就是直接违反UAC安全议定手册上的第12号法规嘛!难道就没有人多读读那个手册吗?
- The author construct a security model of engineering drawings management,including user authentication,the security protocol in storage of drawings files and XML access control. 在分析现有类似系统的不足及工程图档设计工作流后,构造了基于XML的工程图档管理安全模型,分用户认证、图档存储安全协议和基于XML的存取控制三个相关联的方面来实现。
- IPSec security protocol, Internet key exchange (IKE), the work principle and process of each constituent of IPSec protocol are analyzed and researched systematically. 3. 2.系统地研究分析了 IPSec 安全协议和密钥管理协议(IKE),IPSec 协议各个组成部分的工作原理和过程。
- IPSec, the security protocol of internet layer, can provide confidentiality、integrity、Data source authentication、anti-replay attack, making up the defect of WEP. IPSec VPN作为网络层的安全协议,能够提供机密性、完整性、真实性等安全服务,可以有效弥补WEP存在的安全漏洞。
- Has the organisation implemented effective information security protocols? 公司有否推行有效的资料保安管理措施?
- In IPSec protocol, automatic secure parameters negotiation of the security protocol is realized by IKE. IPSec协议使用IKE协议实现安全协议的自动安全参数协商。
- In your browser , you can tell when you are using a secure protocol, such as TLS, in a couple of different ways. 在用户的浏览器中用户可以有许多不同的方式知道何时使用了如TLS之类的安全协议。
- Authentication is implemented using public key certificates, the Kerberos V5 security protocol, and Windows NTLM (for compatibility with Message Queuing 1.0 Running on Windows NT 4.0). 身份验证是使用公钥证书、Kerberos V5安全协议和Windows NTLM(为了与运行在Windows NT 4.;0上的“消息队列”1
- Windows Authentication utilizes Kerberos security protocol, provides password policy enforcement in terms of complexity validation for strong passwords, provides support for account lockout, and supports password expiration. Windows身份验证使用Kerberos安全协议,通过强密码的复杂性验证提供密码策略强制,提供帐户锁定支持,并且支持密码过期。