可信计算应用技术|机械电子|大码头论文阅览中心 关键词 :可信计算 ;可信计算机 ;信息安全 [gap=399]Key words:trusted computing,trusted computing PC,infomation secutiry772008.8
基于1个网页-相关网页
However,due to constraints of academic and industrial,trusted computing PC have not been widely used in the practical applications.
然而,由于学术上和工业上的限制,可信计算机在实际应用中并未得到广泛的推广使用。
参考来源 - 计算环境登录控制机制研究与系统实现·2,447,543篇论文数据,部分数据来源于NoteExpress
With the development of information technology, the advantage of trusted computer in security is much accounted of The Trusted platform module is the core of Trusted Computing PC.
随着信息技术的飞速发展,可信计算机在安全方面的优越性越来越受到国内外计算机领域工作者的重视。
Suggestions have been made that trusted computing is both a potential threat to user privacy and a threat to the ability of the owner of a PC to use it however he or she wishes.
民众意见都认为,可信计算机处理器不但是个人用户的潜在威胁,还是对所有个人电脑使用者期待怎么使用它的能力的一种威胁。
应用推荐