• 入侵探测系统(IDSes)现有安全解决方案了解探测不正当活动所需数据库协议结构

    Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.

    youdao

  • PAM体系结构模块化的,意味着设计为可以通过交换模块支持安全协议组件无缝地转换到一个协议组件。

    PAM's architecture is modular, which means it's designed to support the seamless exchange of one security protocol component for another by swapping out modules.

    youdao

  • 提出了接入结构一个信息论安全高效可验证秘密分享协议

    An information-theoretical secure verifiable secret sharing protocol on this kind of access structures is proposed.

    youdao

  • 接着基础上介绍安全策略协商模型系统结构主要包含协商协议,协商对象,协商策略等部分

    Then it gives the structure of security policy negotiation model including negotiation protocol, negotiation object and negotiation tactics etc.

    youdao

  • 其二,分析ARP协议实现细节,采用ARP欺骗技术实现安全加密路由平台原有网络结构的彻底透明

    The other one is to analyze Address Resolution Protocol (ARP) and implement the transparency of the security and encryption route platform to the original network structure by ARP cheat technology.

    youdao

  • 此基础详细说明了PROFIBUS - DP协议结构包括数据传输报文安全机制可用传输服务

    In addition, the structure of the PROFIBUS-DP protocol including data transmission messages, security mechanism and the available transmission services were also analyzed in details.

    youdao

  • 优化了SET协议模型结构完善了交易流程增强了交易安全性。

    The model structure of SET protocol is optimized, the transaction process is improved, and the transaction security is strengthened.

    youdao

  • 文章简述SSLv3.0分层结构协议状态握手协议加密参数计算安全做出分析

    This article briefly states the layer structure, the states, handshake protocol and cryptographic calculation of SSL V3.0, and analyses its security.

    youdao

  • 给出电子礼券系统完整设计方案,包括功能设计、系统结构设计、安全性设计、数据库设计、协议设计。

    Proposing the technical scheme of the electronic gift certificate system, include the function design, system framework design, safety design, database design and protocol design.

    youdao

  • 然后阐明无线应用协议WAP原理体系结构,以及移动设备安全技术和移动电子商务的应用领域

    Then we expound the principle and architecture of WAP, security of mobile devices and application fields of mobile electronic commerce.

    youdao

  • 基于结构门限思想王志伟等人提出了一个高效的密钥协商协议(TTS协议),认为他们的协议安全的。

    Based on tree and threshold idea Wang et al. proposed an efficient group key agreement protocol (TTS) and claimed that their protocol is secure.

    youdao

  • 适应快速查找需要安全协议数据库(SPD)安全关联数据库(SAD)硬件结构设计

    The hardware design of security policy database (SPD) and security association database (SAD) which are suitable for fast lookup.

    youdao

  • 第2探讨SET协议体系结构SET支付流程。SET协议的体系结构包括SET支付系统结构和SET安全体系结构

    The architecture of SET and SET payment flow have been discussed in Chapter 2. The architecture of SET includes SET payment architecture and SET security architecture.

    youdao

  • 前面讨论基础上,在组成员方提出一个基于GDOI协议安全主机结构模型描述了各个模块的设计思想给出主要数据结构程序

    On the basis of discussing above, a security multicast system model based on GDOI Protocol is proposed. The design idea is described and the main data structures and source programs are provided.

    youdao

  • 前面讨论基础上,在组成员方提出一个基于GDOI协议安全主机结构模型描述了各个模块的设计思想给出主要数据结构程序

    On the basis of discussing above, a security multicast system model based on GDOI Protocol is proposed. The design idea is described and the main data structures and source programs are provided.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定