• On analysis of the principle and application mode of des, a des module which fits for embedded security system such as IC card is realized by topdown design methods.

    详细分析DES基本原理应用模式的基础上,结合DES硬件实现的特点,采用正向设计的方法实现了适用于IC嵌入式安全需要的系统中的DES模块

    youdao

  • This paper first discusses the challenges and attacks in the design of embedded system security, and then studies approaches to bridging the security processing gap and resisting security attacks.

    本文讨论嵌入式系统安全设计面临挑战以及受到攻击方式,探讨了如何弥合安全处理的资源缺陷抵抗攻击的方法。

    youdao

  • This paper shows a high speed embedded finger-print identification system based on NIOS II processor to improve the traditional systems which is slower with lower security.

    为了提高传统指纹识别系统处理速度安全问题,研究基于NIOSII处理器高速嵌入式指纹识别系统

    youdao

  • With the hackers' attacks changing from the desktop to embedded system, hardware and software security decision are leaded the whole design of the embedded systems.

    随着骇客攻击目标台式计算机转向嵌入式系统硬件软件安全决策主导着嵌入式系统设计的流程。

    youdao

  • Using Internet technology in embedded system to control automat, meters, factory equipment, security system and home automation system is new conception recently.

    利用因特网技术当地或远程对嵌入式系统,如自动售货机、各种计、工厂设备保安系统、住宅自动化等应用系统的控制近年来才出现的。

    youdao

  • Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.

    差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,目前的信息安全系统构成严峻挑战。

    youdao

  • In this thesis, we attempt to research security requirements, physical security and implementations for embedded system from algorithm and architecture levels respectively from an end-user.

    终端用户的角度,本文针对嵌入式系统安全需求、安全实现分别算法体系结构两个层次进行重点研究

    youdao

  • Research fields include: embedded system, pervasive computing, network security and data mining.

    主要研究方向嵌入式系统普适计算网络安全数据挖掘

    youdao

  • This paper carries through large and embedded analyses and studies on how to build security mechanism and implement data interface in the Office Automation System.

    本文办公自动化系统如何建立安全机制实现数据接口进行大量深入分析研究

    youdao

  • About the security safeguard technologies of the embedded operating system are presented which could be regarded as the good reference.

    论文中嵌入式操作系统安全技术探讨与实验,对嵌入式系统安全保障技术的进一步研究具有一定的参考价值。

    youdao

  • Due to its open source, security, stability and compatibility, Linux becomes one of the major operating system in embedded development.

    Linux开源安全稳定兼容性成为嵌入式开发主要操作系统之一

    youdao

  • Due to its open source, security, stability and compatibility, Linux becomes one of the major operating system in embedded development.

    Linux开源安全稳定兼容性成为嵌入式开发主要操作系统之一

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定