• Service Levels and running flow of wireless transport layer security are described. WTLS state machine is designed by message event driven, design and implement WTLS of mobile terminal.

    阐述无线传输安全协议服务类型、运行流程,采用消息事件机制设计WTLS状态,并移动终端上设计且实现了WTLS。

    youdao

  • Code access security policy configuration state consists of three administrative policy levels: enterprise, machine, and user policy.

    代码访问安全性策略配置状态分为三个管理策略级别企业计算机用户策略。

    youdao

  • If the user has a roaming profile, then the security state encoded by the user process running on one machine can be decoded by a user process running on a different machine.

    如果用户漫游配置文件运行计算机用户进程编码安全状态可以由运行在一台计算机上的用户进程解码

    youdao

  • The machine and converter remain in the safe operating state, the stability and the security of system is thus enhanced.

    电网故障时使电机变换器安全穿越故障,保持不脱运行提高系统稳定性安全性

    youdao

  • This paper presents a formal approach to specify security model based on the theory of finite state machine(FSM) and the concept of communicating sequential process (CSP).

    形式概念分析是从形式背景基本数据形式开始,因此形式背景的规模是影响概念格构造和应用的一个重要因素。

    youdao

  • This paper presents a formal approach to specify security model based on the theory of finite state machine(FSM) and the concept of communicating sequential process (CSP).

    形式概念分析是从形式背景基本数据形式开始,因此形式背景的规模是影响概念格构造和应用的一个重要因素。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定