If random numbers are messed up, all security based on it is suspicious.
如果随机数搞乱了,那么基于它之上的所有安全都是可疑的。
Bad security based on direct communication?
基于直接通信不安全?
A new architecture with high security based on security kernel is presented in this paper.
文中描述了一个基于安全内核的、具有高安全性的信息安全包体系架构的设计。
Great precision will give us an inappropriate sense of security based on the implied but false fidelity.
过高的精确度将给我们带来不真实精确度的不适当安全感。
Several convertible signcryption schemes with semantic security based on elliptic curve cryptosystem were proposed.
基于椭圆曲线密码体制建立了几个具有语义安全的可转换签密方案。
You may be accustomed to having a sense of security based on the stability of predictable interactions with people close to you.
当与靠近你的人有了可预见性的互动的稳定性之后,你会渐渐适应,并有了安全感。
Information security based on national economy security is one of the preconditions and foundations of national economic security.
基于国家经济安全的信息安全是保障国家经济安全的前提和基础之一。
The article analyses the security mechanisms and structures, as well as the achievement of security based on the WAP security architecture.
文章具体分析了WAP的安全机制及架构以及基于WAP安全架构的安全实现方式。
A new architecture with high security based on security kernel is presented in this paper, security kernel can ensure the information in the toolkit.
文中描述了一个基于安全内核的、具有高安全性的信息安全包体系架构的设计。
If you were married for at least 10 years and you're 62 or older, you can apply for Social Security based on your ex-husband's work record, if you haven't remarried.
如果你的年纪已达62岁并且有至少10年的婚龄,你可以在还没有再婚的时候根据你前夫的工作记录申请社会保障;
The progress of humanity needs a peaceful environment. It is impossible for a country to achieve stability and security based on the upheavals and crisis of other countries.
人类进步需要和平的环境,一国的稳定安全不可能建立在别国的动荡危机之上。
For the current mixed-type attacks on an endless stream of security threats, traditional network security based on a single device protection technology has become powerless.
对于当前混合型攻击层出不穷的安全威胁,传统的基于单一设备的网络安全防护技术己显得无能为力了。
This paper advances an invasion detection model in the network security based on multi-sensor data fusion, and introduces in detail the structure of invasion detection system.
提出了网络安全中基于多传感器数据融合技术的入侵检测模型,并对入侵检测系统的体系结构进行了详细介绍。
Information security is always a delicate and pop subject in the field of it. During the gradual mastery of PKI, specialists are devoted to the study of network security based on PKI.
信息安全一直是业界十分敏感和热门的话题,专家们在逐步认识PKI的过程中,致力于各种基于PKI的网络安全解决方案的研究。
Follow a consistent written and [missing word] strategy toward application security based on secure software development best practices (see Apache's excellent list for Web Services in Resources).
根据安全软件开发的最佳实践,遵守一致的编写和[missingword]策略实现应用程序安全性(请参阅参考资料中apache的优秀Web服务列表)。
An physical approach of network security based on PCI bus is proposed, the design scheme of the core component, PCI control card, is introduced, and realization of some key technologies is described.
提出了基于PCI总线网络安全的一种物理实现方法,详细介绍了其核心部件PCI控制板卡的设计方案,并描述了其中几个关键技术的实现。
It'd offer greater security, because it'd be on a home-based contract.
它会更具安全性,因为它是一份基于家庭的合同。
Security realms based on login module implementations that either use digital certificates or are user implemented are beyond the scope of this article.
基于各种登录模块实现(使用数字证书,或由用户实现的登录模块实现)的安全领域超出了本文的范围。
Security is controlled based on the user's identity.
基于用户身份来控制安全性。
Steps to implement Role based security
实现基于角色的安全性的步骤
Policy based service security management.
基于策略的服务安全性管理。
In this series of articles, I introduced you to using Acegi security System to enforce both URL-based security and method-based security.
在这份共分三部分的系列文章中,我介绍了如何使用Acegi安全系统增强基于URL的安全性和基于方法的安全性。
This implementation of WS-Security was based on the OASIS working draft 13 specification.
WS - Security的这个实现基于OASIS工作草案13规范。
The presumption is that you can make security decisions based on the information in these tokens.
这种方法假设您可以根据这些令牌中的信息做出安全性决策。
Each user should have access to a security level based upon the level of data sensitivity he or she can see.
根据用户可以看到的数据的敏感性级别,每个用户都应该可以访问某个安全级别。
The security Configuration Wizard allows you to create XML-based security policies, which can then be applied to your servers.
安全配置向导允许你创建基于XML的安全策略。它们可以应用到你的服务器上。
These decisions are made based on security roles.
要根据安全角色来作出此类决定。
Role-based security is the most straightforward way to organize commands for security purposes.
基于角色的安全性是组织命令、实现安全性最简单的方法。
Role-based security is the most straightforward way to organize commands for security purposes.
基于角色的安全性是组织命令、实现安全性最简单的方法。
应用推荐