• We'll close this discussion with a look at several up-and-coming content formats, security protocols, and tools for implementing end-to-end wireless security.

    我们通过研究几种很有前途的(用于实现端到端无线安全性的)内容格式、安全性协议工具结束这个讨论

    youdao

  • Network traffic generator plays an important role in analyzing the performance of network and implementing network protocols.

    网络流量发生器网络性能分析协议实现中具有重要作用

    youdao

  • In the case of many delegate protocols, adopting a protocol is simply a matter of implementing the methods defined by that protocol.

    对于许多代理协议接收协议比直接现实协议中定义方法简单

    youdao

  • Finally, the implementing method for IKE protocols based on VPN is presented.

    最后提出基于VPNIKE协议实现方案

    youdao

  • Finally, the implementing method for IKE protocols based on VPN is presented.

    最后提出基于VPNIKE协议实现方案

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定