• 入侵容忍技术信息保护技术入侵检测容错技术之后第三网络安全核心

    Intrusion tolerant technology is the core of the third generation of network security in back of information protection, intrusion detection and fault tolerance technology.

    youdao

  • 受保护系统组件受到攻击时,入侵容忍技术维持整个系统关键信息服务完整性机密性可用性。

    When the component of the protected system is attacked , intrusion tolerant technology can maintain integrity , confidentiality and usability of the whole system's key information and service .

    youdao

  • 入侵容忍技术认同安全问题不可避免性,针对安全问题,不再将消除或者防堵作为第一重点把目光投射如何攻击之下系统保证间断地正常运行一点。

    The tolerance technology admits that security problem is unavoidable, and it focuses on how system can organically assure and survive under attacks but not how to prevent or eliminate the attacks.

    youdao

  • 目前为止,学术界对于基于门限密码学入侵容忍研究几乎都集中门限rsa密码技术应用上。

    Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.

    youdao

  • 测试表明本文设计门限加密入侵容忍保护技术安全弹性目前所使用的私钥认证保护技术

    The result of test indicate that the safety resilience of scheme on our paper is better than others private key prevent technique by now.

    youdao

  • 入侵容忍系统按照不同标准进行分类,对现有容忍入侵技术进行分类介绍

    Classify existing intrusion tolerant systems with different standards and make an overview of existing intrusion tolerant technologies.

    youdao

  • 容忍入侵数据安全领域核心技术之一,其目标系统受到攻击时仍对外继续提供服务

    IntrusionTolerant is the key technology in data-security nowadays. The aim is that when system is attacked, the system can still provide service.

    youdao

  • 容忍入侵数据安全领域核心技术之一,其目标系统受到攻击时仍对外继续提供服务

    IntrusionTolerant is the key technology in data-security nowadays. The aim is that when system is attacked, the system can still provide service.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定