• 我们分别每一个方向上检查

    Let's examine security propagation in each direction separately.

    youdao

  • SFTP一个文件网络协议

    SFTP is a network protocol that enables files to be transferred securely.

    youdao

  • 讨论平均跟踪性与拓扑混合混沌关系

    Relations among the average-shadowing property, totally transitive, topologically weakly mixing and chaos were discussed.

    youdao

  • 基于内在防爆爆炸性危险地区感器可提供

    Intrinsically safe sensors based on ATEX for explosive and hazardous areas are also available.

    youdao

  • 这个可以快速金融信息系统全球范围内应用广泛

    It is the broadest system of its kind for sending financial messages around the world quickly and securely.

    youdao

  • tar实用程序创建存档ssh则实现存档

    The tar utility creates the archive, and SSH facilitates secure transfer of the archive.

    youdao

  • 本文课题中所使用密钥管理方法进行研究

    This dissertation puts emphasis on the research of security transmission and secret key management of the project.

    youdao

  • 基于网络数据问题信息安全领域的重要课题之一。

    The safety of data transmission based on the web is an important task in information safety domain.

    youdao

  • EDI报文信息身份认证EDI应用推广关键

    The secure transportation and identity authentication of EDI message are the key part of the EDI's application and development.

    youdao

  • 介绍了基于XML数据交换模型基于VPN的数据方式

    The author still introduce data exchange model based on XML and data safe exchange style on VPN.

    youdao

  • 如何有效地保障机密信息网络输,成为人们日益关注焦点。

    How to protect the transmission of secret information on the network effectively has becoming the concern.

    youdao

  • 如何有效地保障机密信息网络输,成为人们日益关注焦点

    How to protect the transmission of secret information on the network effectively has increasingly become the focus that people concern.

    youdao

  • 通过加密算法研究给出应用多种加密算法实现数据方法

    By research encrypt algorithms, provided the technique about secure transmission of data based on multifold encrypt algorithms.

    youdao

  • 此外,文中以公钥单钥算法相结合的方式确保数据认证

    In addition, public key and symmetric key operations are employed simultaneously to ensure the secure transmission and authentication of data.

    youdao

  • 使用SSL进行信息,必须先使用SSL握手协议建立安全连接

    In order to perform secure transfer of information with SSL, a secure connection with SSL handshake protocol is to be created first.

    youdao

  • 如何在网络实现XML数据教育管理信息系统需要解决的一大问题。

    Now, how to realize the safe transmission of XML data in education management information system needs to be solved.

    youdao

  • 不是完意义上公园也不是单纯体育场馆而是两者结合统一

    It is neither traditional park, nor pure sports hall, but combination and unity of the both.

    youdao

  • 由于小说文本存在不可拍摄性,两种版本电影都不可能完全传小说文学主题

    Owing to the unfilmable nature of the novelistic text, the two versions have failed in presenting some of the literary themes of the original novel.

    youdao

  • 纵向认证:采用认证、加密访问控制手段实现数据以及纵向安全防护。

    Longitudinal authentication: authentication, encryption, access control and other means to achieve the safe transmission of data and the security of the vertical sector.

    youdao

  • 最后本文深入分析SSL3.0协议基础提出了一个网络应用构想。

    An idea about the security transfer on network, which is based on the SSL3.0 protocol, is also put out at the end of this paper.

    youdao

  • 本文针对XML数据安全性问题为此设计物流信息系统xml数据的安方案

    The paper analyzes the security problem of XML data in logistic information systems, and develops a scheme for XML data secure transmission.

    youdao

  • 论述SSL协议基本原理功能提出了基于SSL目录服务输的实验模型

    The paper discusses the basic principles and functions of SSL Protocol. It also puts forward the SSL-based model of secure transportation for directory service.

    youdao

  • 应该soap现有机制(ssl)解决这些安全性问题提供强大的保护

    These security issues should be addressed at the SOAP layer in conjunction with existing secure transport mechanisms like SSL to provide the strongest protection.

    youdao

  • FSCA具有安全性可扩展性可操作性,解决网上用户身份认证和信息问题

    FSCA possesses security, expansibility and controllability, and solves the problems of online user authentication and information exchange security.

    youdao

  • 最后断路器开关控制设计了控制信息控制中心间隔ied流程

    Finally controlling the breaker is taken as an example, and the process for security transmission of the controlling information from control Center to IED in bay layer is designed.

    youdao

  • 使用这些方式的方式是一样的,仅仅需要提供额外安全属性证书

    You use these secure transports the same way as the ones mentioned in this section, you just have to supply some additional security properties such as certificates.

    youdao

  • 高阳著名长篇历史小说《胡雪岩全传》以文学艺术形式反映了晚清官之间复杂关系

    Biography of Hu Xue-yan, a famous historical novel by Gao Yang, reflects the complicated relationship among officials, domestic merchants and foreign merchants in the artistic form of literature.

    youdao

  • 身份识别认证以及数字签名技术现有安全理论保证网络环境下信息的有力手段

    Identification recognition, authentication and digital signature are strong methods of available security theories to secure safe transmission in network environment.

    youdao

  • 由于希望安全性,因此需要使用消息安全机制比如WS - Security

    Because you also want security on insecure transports you use message-level security mechanisms such as WS-Security.

    youdao

  • SELinux 只有程序执行时允许发生输,控制进程权限不是一个进程的一部分)。

    SELinux permits security transitions to occur only upon program execution, and it controls process' permissions (not portions of a process).

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定