Set up document exchange protocols and security protocols.
建立文档交换协议和安全协议。
Security a "measures the adherence to security protocols and mechanisms."
安全性——测量对安全协议和安全机制的遵从性。
E-Commerce security protocols based on XML are discussed in the paper.
本文主要对基于XML的电子商务安全协议进行了研究。
Ford describes the security protocols attached to the new feature, writing.
福特并描述了WPA2无线网络的安全特性。
Yet, existing security protocols for multicast offer only partial solutions.
然而,现有的组播安全协议仅能提供部分的解决方法。
All of the above security protocols can bind to Web services messaging protocols.
所有上述安全性协议都可以绑定到Web服务消息传递协议。
These security protocols used different authentication methods and encryption algorithm.
这些安全协议使用不同的认证方法和加密算法。
A bulk of these funds have been allocated towards constructing airtight security protocols.
大部分资金都用在了网络安全协议建设和维护上。
It is designed to create a separation of concerns between application protocols and security protocols.
它用于创建应用程序协议和安全协议之间的分离关系。
However, many existing security protocols are proven not to be so reliable as what were expected.
不过,已有的安全协议往往被证实并不如它们的设计所期望的那样安全。
The logic can be used not only to analyze security protocols, but also to design security protocols.
该逻辑不但可以用来分析安全协议,而且可以用来设计安全协议。
SET and SSL are two protocols that are currently used most commonly among the ec security protocols.
在目前已经实现的电子商务安全协议中,最常用的是SET和SSL两种协议。
Therefore, the security of security protocols has become one of the key problems of network security.
因此,安全协议自身的安全性成了网络安全的关键问题之一。
He is also concerned with the verification of security protocols through semantic formalisms and type checking.
他关注的领域还有通过语义形式和类型检查对安全性协议进行验证。
In this paper, a non monotonic dynamic logic that verifies properties of security protocols is introduced.
该文提出一种论证安全协议之安全性质的非单调动态逻辑。
This paper proposes a non-monotonic logic which can be used to analyze the properties of security protocols.
本文提出一种对安全协议进行分析的非单调逻辑。
These methods are also effective used in Electronic Commerce Protocols which is a part of Security Protocols.
电子商务协议作为安全协议的一部分,这些方法在电子商务协议中同样有效。
One key factor that prevents widespread adoption of IPMI is its lack of support for enterprise security protocols.
一个阻碍广泛使用IPMI的关键因素是缺少对企业安全协议的支持。
This pattern would support a wide range of incoming security protocols while simplifying security in other ESB components.
此模式将支持各种传入安全协议,而且同时能简化其他ESB组件中的安全措施。
The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.
密码协议分析与设计的基础是对其进行形式化建模。
Data security technology, data security protocols and P2P technology are the effective measures for Online Privacy protection.
网络信息安全技术、信息安全协议、P 2 P技术成为网络隐私安全保护的有效手段。
Typical examples include logging data about the request or response, processing security protocols, managing session attributes, and more.
典型的例子包括记录关于请求和响应的数据、处理安全协议、管理会话属性,等等。
Traditional security technology, such as security protocols, digital certificate, can be used to solve some security problems in P2P.
为了解决P 2 P的安全问题,可以采取传统的安全技术,如安全协议、数字证书等等。
Several XML security protocols have been proposed to support communication data security in XML applications. Among them are the following.
已提出了几个XML安全性协议以在XML应用程序中支持通信数据安全性。
Configure the environment for SOAP security: SOAP security protocols require access to the libraries that implement SOAP security algorithms.
为SOAP安全配置环境:SOAP安全协议需要访问实现SOAP安全算法的库。
People pay more attention on the security of protocols, especially in how to model and analyze security protocols in special environment.
与此相应的就是人们对协议的安全性更加关注,尤其是在特殊环境下如何建模和分析安全协议显得尤为重要。
We presented several new algorithms of model checking epistemic logics, and explore their applications in verifications of security protocols.
我们给出了一些新的模型检测算法,并探讨它们在安全协议验证中的应用。
We propose some new taxonomy of the security protocols proposed for Electronic Voting procedures and examine their advantages and shortcomings.
对电子选举协议提出了新的分类方法,并考察了其优缺点;
Two out of security protocols SLL and SET are analyzed in detail concerning with the security problems in electronic data interchanging business.
就电子商务的安全性问题详细剖析了两种安全协议,SL L协议、SET协议。
Two out of security protocols SLL and SET are analyzed in detail concerning with the security problems in electronic data interchanging business.
就电子商务的安全性问题详细剖析了两种安全协议,SL L协议、SET协议。
应用推荐