• This paper focuses on using mobile phone platform to design embedded security system.

    本文基于手机平台着重于提出和探讨嵌入式安防系统的架构。

    youdao

  • On analysis of the principle and application mode of des, a des module which fits for embedded security system such as IC card is realized by topdown design methods.

    详细分析DES基本原理应用模式的基础上,结合DES硬件实现的特点,采用正向设计的方法实现了适用于IC嵌入式安全需要的系统中的DES模块

    youdao

  • This paper first discusses the challenges and attacks in the design of embedded system security, and then studies approaches to bridging the security processing gap and resisting security attacks.

    本文讨论嵌入式系统安全设计面临挑战以及受到攻击方式,探讨了如何弥合安全处理的资源缺陷抵抗攻击的方法。

    youdao

  • With the wide application of the embedded system, its security is in urgent need.

    随着嵌入式系统广泛应用,对系统安全需求日益迫切

    youdao

  • This paper shows a high speed embedded finger-print identification system based on NIOS II processor to improve the traditional systems which is slower with lower security.

    为了提高传统指纹识别系统处理速度安全问题,研究基于NIOSII处理器高速嵌入式指纹识别系统

    youdao

  • With the hackers' attacks changing from the desktop to embedded system, hardware and software security decision are leaded the whole design of the embedded systems.

    随着骇客攻击目标台式计算机转向嵌入式系统硬件软件安全决策主导着嵌入式系统设计的流程。

    youdao

  • Using Internet technology in embedded system to control automat, meters, factory equipment, security system and home automation system is new conception recently.

    利用因特网技术当地或远程对嵌入式系统,如自动售货机、各种计、工厂设备保安系统、住宅自动化等应用系统的控制近年来才出现的。

    youdao

  • Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.

    差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,目前的信息安全系统构成严峻挑战。

    youdao

  • In this thesis, we attempt to research security requirements, physical security and implementations for embedded system from algorithm and architecture levels respectively from an end-user.

    终端用户的角度,本文针对嵌入式系统安全需求、安全实现分别算法体系结构两个层次进行重点研究

    youdao

  • Research fields include: embedded system, pervasive computing, network security and data mining.

    主要研究方向嵌入式系统普适计算网络安全数据挖掘

    youdao

  • This paper carries through large and embedded analyses and studies on how to build security mechanism and implement data interface in the Office Automation System.

    本文办公自动化系统如何建立安全机制实现数据接口进行大量深入分析研究

    youdao

  • About the security safeguard technologies of the embedded operating system are presented which could be regarded as the good reference.

    论文中嵌入式操作系统安全技术探讨与实验,对嵌入式系统安全保障技术的进一步研究具有一定的参考价值。

    youdao

  • Due to its open source, security, stability and compatibility, Linux becomes one of the major operating system in embedded development.

    Linux开源安全稳定兼容性成为嵌入式开发主要操作系统之一

    youdao

  • This paper gives the system hardware and software design of embedded WSNs car security system.

    本文给出嵌入式无线传感器汽车防盗系统软硬件设计方案

    youdao

  • System Security - Embedded Security hardware tamper detected.

    系统安全性- 检测 到Embedded Security硬件窜改

    youdao

  • System Security - Embedded Security hardware tamper detected.

    系统安全性-检测到Embedded Security硬件窜改

    youdao

  • System Security - Embedded Security hardware tamper detected.

    系统安全性-检测到Embedded Security硬件窜改

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定