• We analyse the security of e-commerce protocols in failure environments using the model checking approach.

    本文模型检测方法分析不可靠环境下电子商务协议安全性质。

    youdao

  • No technology, no matter how advanced, will help enhance the security of e-commerce without sufficient application and recognition.

    没有技术无论多么先进有助于提高安全性电子没有足够的商业应用认可

    youdao

  • E-commerce security protocol is not only an important way to protect the security of e-commerce, but also the core technology of thee-commerce.

    电子商务安全协议保障电子商务安全性重要途径也是电子商务核心最关键的技术

    youdao

  • It has been proven by instances that the extended model and method can better analyze and describe the security of e-commerce security protocol, and be applied in wider fields.

    实例证明扩展后模型方法能够精确地分析描述电子商务安全协议安全性能够应用更广泛的领域。

    youdao

  • In the light of the economic security and risks existing in e-commerce, the industrial safety checklist can be used in thee-commerce for estimating the security of e-commerce platform.

    针对电子商务存在经济安全和风险工业安全检查表法应用电子商务评价电子商务平台安全性

    youdao

  • For example, any part of your application that deals with e-commerce, banking, or finances requires the heaviest data security and encryption you can get your hands on.

    例如处理电子商务银行交易金融任何应用程序部分都需要所能提供最高级别的安全性加密

    youdao

  • This paper introduces the basic concepts of SET, the primary technologies involved and the running procedure, at the same time it analyses how SET implement the security of e - commerce.

    这里详细介绍SET基本概念、所使用的主要技术以及运行过程同时分析了SET是怎样解决网上交易安全性的。

    youdao

  • P2P Electronic Commerce greatly enhances the conveniency and flexibility of e-business, on the other hand that aggravates the risk and security threatening of business activity.

    P2P电子商务比传统电子商务方便、更灵活,但用户所涉及风险安全威胁越大,各种网络诈骗层出不穷。

    youdao

  • As a new business model, information security, security is a prerequisite for the implementation of e-commerce.

    而作为一种全新商务模式信息安全保障电子商务实施前提

    youdao

  • This paper describes the mathematics base of algebraic geometry and ECC. It also discusses the elliptic curve discrete logarithm problem (ECDLP) and the security applications of ECC on E-commerce.

    该文描述了代数几何ecc数学基础椭圆曲线离散对数问题困难性讨论了ECC电子商务中的安全应用

    youdao

  • Under this tide, traditional security ways have been no longer reliable to satisfy the need of complex behaviors of e-commerce and information security.

    潮流之下,传统保密与认证方式难以应付日益复杂电子交易信息保密措施需要

    youdao

  • From data of accountant to information system of accountant, the paper builds the security control system of corporation accountant in the circumstance of E-commerce.

    本文点(会计数据)面(会计信息系统)构建电子商务环境下企业会计安全控制体系

    youdao

  • Now, the personal online privacy security has become not only a problem that Internet users are more and more concerned about, but also one of the biggest challenges that e-commerce are facing.

    个人在线隐私安全不仅成为互联网用户越来越关心问题之一成为电子商务面临最大挑战之一。

    youdao

  • Traditional security ways, such as PIN code, are no longer reliable and difficult to satisfy the complex behaviors of e-commerce and information security.

    在此潮流之下,传统保密认证方式识别码,已难以应付日益庞杂电子交易信息保密措施等的需求。

    youdao

  • Since B2C is a kind of E-commerce website for on-line sales, the requirement on its security authentication be - comes very high.

    由于B2C在线销售电子商务网站,所以对于安全认证要求很高。

    youdao

  • Finally, this paper presents security planning and design of PICC E-commerce Platform. It systematically set up a secure PICC E-commerce Platform.

    最后给出PICC电子商务平台安全规划设计系统地搭建一个安全的PICC电子商务平台。

    youdao

  • With the advent of the network society and the growing popularity of e-commerce, traditional system security technology which depends on token or password has been facing serious challenges.

    随着网络社会到来电子商务日趋普及传统依赖信物口令系统安全性技术已经面临严峻挑战

    youdao

  • Lastly, personnel management, security systems, auditing system security management and other aspects of e-commerce.

    最后人员管理保密制度审计制度方面论述电子商务安全管理。

    youdao

  • Ate-commerce and e-government applications increasingly wide range of today, security and trust in e-commerce has become the most important and the core problem.

    电子商务电子政务应用日益广泛今天安全和信任问题成为电子商务中重要最核心的问题。

    youdao

  • The main thesis completed the following work: 1. Fingerprint technology and e-commerce security certification of the theoretical analysis.

    本论文主要完成以下工作:(1)指纹技术电子商务安全认证理论分析。

    youdao

  • The basic requirement of the E-commerce is security and legality.

    电子商务基本要求安全和合法。

    youdao

  • The importance of e-commerce security protocol is self-evident as a key factor to ensure the information and data security, and to safeguard the vital interests of both sides.

    电子商务安全协议作为切实保证交易双方信息数据安全,维护双方切身利益的关键因素,其重要性不言而喻

    youdao

  • In the fields of military communications systems and E-Commerce and many others, information security and confidentiality is very important.

    军事通信系统电子商务领域信息安全和保密至关重要

    youdao

  • At last, according to the content, the article analysis and designs a set of realization scheme for E-commerce security system.

    最后,笔者根据这些内容分析设计电子商务安全系统实现方案

    youdao

  • At last, according to the content, the article analysis and designs a set of realization scheme for E-commerce security system.

    最后,笔者根据这些内容分析设计电子商务安全系统实现方案

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定