• Set up document exchange protocols and security protocols.

    建立文档交换协议安全协议。

    youdao

  • Security a "measures the adherence to security protocols and mechanisms."

    安全性——测量安全协议安全机制遵从性。

    youdao

  • E-Commerce security protocols based on XML are discussed in the paper.

    本文主要对基于XML电子商务安全协议进行了研究。

    youdao

  • Ford describes the security protocols attached to the new feature, writing.

    福特描述了WPA2无线网络的安全特性

    youdao

  • Yet, existing security protocols for multicast offer only partial solutions.

    然而现有组播安全协议能提供部分解决方法

    youdao

  • All of the above security protocols can bind to Web services messaging protocols.

    所有上述安全性协议可以绑定Web服务消息传递协议。

    youdao

  • These security protocols used different authentication methods and encryption algorithm.

    这些安全协议使用不同认证方法加密算法

    youdao

  • A bulk of these funds have been allocated towards constructing airtight security protocols.

    大部分资金在了网络安全协议建设和维护上

    youdao

  • It is designed to create a separation of concerns between application protocols and security protocols.

    用于创建应用程序协议安全协议之间分离关系

    youdao

  • However, many existing security protocols are proven not to be so reliable as what were expected.

    不过已有安全协议往往被证实并不它们的设计所期望的那样安全

    youdao

  • The logic can be used not only to analyze security protocols, but also to design security protocols.

    逻辑不但可以用来分析安全协议而且可以用来设计安全协议。

    youdao

  • SET and SSL are two protocols that are currently used most commonly among the ec security protocols.

    目前已经实现电子商务安全协议常用的是SETSSL两种协议。

    youdao

  • Therefore, the security of security protocols has become one of the key problems of network security.

    因此安全协议自身安全性成了网络安全的关键问题之一

    youdao

  • He is also concerned with the verification of security protocols through semantic formalisms and type checking.

    关注领域还有通过语义形式类型检查安全性协议进行验证

    youdao

  • In this paper, a non monotonic dynamic logic that verifies properties of security protocols is introduced.

    该文提出一种论证安全协议之安全性质单调动态逻辑

    youdao

  • This paper proposes a non-monotonic logic which can be used to analyze the properties of security protocols.

    本文提出一种安全协议进行分析非单调逻辑

    youdao

  • These methods are also effective used in Electronic Commerce Protocols which is a part of Security Protocols.

    电子商务协议作为安全协议一部分这些方法电子商务协议同样有效

    youdao

  • One key factor that prevents widespread adoption of IPMI is its lack of support for enterprise security protocols.

    一个阻碍广泛使用IPMI关键因素缺少企业安全协议支持

    youdao

  • This pattern would support a wide range of incoming security protocols while simplifying security in other ESB components.

    模式支持各种传入安全协议而且同时能简化其他ESB组件中的安全措施。

    youdao

  • The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.

    密码协议分析设计基础进行形式化建模

    youdao

  • Data security technology, data security protocols and P2P technology are the effective measures for Online Privacy protection.

    网络信息安全技术、信息安全协议P 2 P技术成为网络隐私安全保护有效手段

    youdao

  • Typical examples include logging data about the request or response, processing security protocols, managing session attributes, and more.

    典型例子包括记录关于请求响应数据处理安全协议管理会话属性等等

    youdao

  • Traditional security technology, such as security protocols, digital certificate, can be used to solve some security problems in P2P.

    为了解决P 2 P安全问题可以采取传统的安全技术安全协议数字证书等等

    youdao

  • Several XML security protocols have been proposed to support communication data security in XML applications. Among them are the following.

    提出了几个XML安全性协议XML应用程序支持通信数据安全性。

    youdao

  • Configure the environment for SOAP security: SOAP security protocols require access to the libraries that implement SOAP security algorithms.

    SOAP安全配置环境:SOAP安全协议需要访问实现SOAP安全算法

    youdao

  • People pay more attention on the security of protocols, especially in how to model and analyze security protocols in special environment.

    与此相应就是人们协议安全性更加关注尤其是特殊环境下如何建模分析安全协议显得尤为重要。

    youdao

  • We presented several new algorithms of model checking epistemic logics, and explore their applications in verifications of security protocols.

    我们给出了一些新的模型检测算法探讨它们安全协议验证中的应用

    youdao

  • We propose some new taxonomy of the security protocols proposed for Electronic Voting procedures and examine their advantages and shortcomings.

    电子选举协议提出了新的分类方法考察优缺点

    youdao

  • Two out of security protocols SLL and SET are analyzed in detail concerning with the security problems in electronic data interchanging business.

    电子商务安全性问题详细剖析了两种安全协议SL L协议、SET协议。

    youdao

  • Two out of security protocols SLL and SET are analyzed in detail concerning with the security problems in electronic data interchanging business.

    电子商务安全性问题详细剖析了两种安全协议SL L协议、SET协议。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定