• PKI is the latest information security technology in the world, and trust model is very important in PKI system.

    PKI目前国际上研究最热信息安全技术信任模型PKI体系中占有重要地位。

    youdao

  • In the information security technology research, two different points of view and directions have come into being.

    反映信息安全技术研究上,形成两个完全不同角度方向

    youdao

  • The cryptology technology is the core of information security technology, which we can only empolder it by ourselves.

    密码技术信息安全技术中的核心技术,只能自主开发

    youdao

  • PKI technology which is the kernel of the information security technology can solve many security problems of thee-government.

    PKI技术作为信息安全技术核心能够有效地解决电子政务中的各种安全问题

    youdao

  • The article concentrates on searching and analyzing the website construction technology and the information security technology.

    本文着重探析其中网站建设技术信息安全技术。

    youdao

  • Digital watermarking is a new information security technology, providing effective copyright protection for multi-media digital works.

    数字水印技术一种全新信息安全技术,可认为多媒体数字作品版权维护提供有效的解决手腕。

    youdao

  • The software infrastructure and information security technology have been summarized to indicate the feasibility of this software system.

    同时软件构架以及信息传输安全性等关键技术总结,表明系统实现可行性

    youdao

  • The information security technology relates to a variety of areas, but the cryptogram technology is the core of all security technologies.

    尽管安全技术涉及范围十分广泛密码技术各种安全技术核心

    youdao

  • The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology.

    本文介绍安全电子邮件系统通过信息安全技术传统的电子邮件系统进行扩展完善。

    youdao

  • Therefore, the information security technology has emerged, including two branches, the public-key cryptosystem and digital signature system.

    因此信息安全技术便应运而生包括公钥密码体制数字签名体制两个分支

    youdao

  • This paper gives an overview of the construction of information security assurance system of digital library with information security technology.

    本文信息安全技术方面建立信息安全保障体系进行论述。

    youdao

  • Grading protection is an important tenet in information security technology. This tenet is also applicable to the network disaster-tolerant system.

    等级保护信息安全技术重要原则之一,作为信息安全重要组成部分网络容灾系统同样遵循一原则。

    youdao

  • Following the big development of the pluralism and digitalization of the information, information security technology become more and more important.

    随着信息多元化数字化迅猛发展,信息安全技术显得越来越重要。

    youdao

  • As a branch of multimedia information security technology, digital image authentication is paid close attention by one of a growing number of experts.

    数字图像认证技术作为多媒体信息安全技术分支之一受到了越来越多专家学者的重视。

    youdao

  • The block cipher coprocessor has been applied in a PCI-FPGA cipher card designed by the Information Security Technology Laboratory of Guangzhou University.

    分组密码处理器现已成功的应用到了广州大学信息安全技术实验室研制PCI - FPGA密码中。

    youdao

  • But, as a very important information security technology, digital Watermark technology has provided a strong solution for the protection of digital multimedia work.

    数字水印技术作为重要信息安全手段多媒体著作的保护提供一个强有力的解决方案

    youdao

  • By IDMAS prototype realization, I have a more profound understanding of IDMAS, and proved that IDMAS in the current network information security technology in the role.

    通过对IDMAS原型系统分析与设计,对ID MAS深刻的理解并且证明了ID MAS当前网络信息安全技术中的作用

    youdao

  • All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.

    这些导致企业无法成熟IT信息安全技术直接应用于工业控制系统信息安全保护

    youdao

  • In this paper, the threat to information security, information security technology and information security management of information security for the campus network, where explored.

    本文信息安全威胁、信息安全技术信息安全管理校园网信息安全进行探讨

    youdao

  • Program security is gradually becoming an active field in information security technology. It mainly includes program vulnerabilities analysis and program security protection technologies.

    程序安全信息安全研究一个重要方向主要研究程序缺陷分析安全保护技术等

    youdao

  • This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.

    课题现有网络通信技术数据库技术信息安全技术基础设计实现新型的安全即时通信系统。

    youdao

  • While the identity authentication technology are network security and information system security the first barrier, it is time network information security technology a very important research field.

    身份认证技术网络安全和信息系统安全一道屏障网络时代信息安全技术非常重要一个研究领域。

    youdao

  • "Each magstripe has three tracks of information," explains payments security expert Jeremy Gumbley, the chief technology officer of CreditCall, an electronic-payments company.

    电子支付公司CreditCall首席技术、支付安全专家杰里米·冈布利解释说:“每个磁条都信息轨迹。”

    youdao

  • This part's chapters contain a massive amount of information, reflecting the many aspects of digital security, and discussing the history as well as popular misconceptions for each technology.

    部分章节包含大量信息反映数字安全许多方面并且对于一个技术都讨论了其历史普遍误解

    youdao

  • The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.

    协议涵盖企业安全呼吁支持信息技术服务,对新出现网络威胁网络入侵提高认识

    youdao

  • Generally, developers don't expect the mobile cloud to be free from security threats any more than they expect that of any other information technology (it) model used to support business.

    通常开发人员认为移动免受安全威胁,就如同他们不认为其他任何信息技术(IT)模式支持业务一样。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务主要客户是美国情报和军事部门。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定