您要查找的是不是:
- Online security is being built in to the system, not tagged on. 聯(lián)機安全措施正被內置在系統中,不是外加的。
- Backup, store and share files online securely. 備份檔案儲存及網(wǎng)上互通共享。
- You can have substantially stronger online security by taking a few more steps, which are simple and straightforward. 你只需依照簡(jiǎn)易直接的步驟,便能大大提升網(wǎng)上交易的安全。
- Finally , we give a simple security analysis of the protocol to show that it fulfils these requirements . 最后,對該協(xié)議進(jìn)行了簡(jiǎn)要的安全分析,證明它能夠滿(mǎn)足這些安全要求。
- Make out a set of careful online security schemes. And the network department does freemaintenance and maintenance for the customer in unit hardwareof the computer and software,. 蘇州安琪計算機網(wǎng)絡(luò )工程有限公司。
- We perform a security analysis and heuristically argue that the protocol obtains all desired security attributes. 隨后,我們提出了第一個(gè)無(wú)證書(shū)三方密鑰協(xié)商協(xié)議。
- Visual modelizaton and XML was used to build a thermo-hydraulics security analysis model library for RELAP5 programme. 摘要采用可視化建模技術(shù)及可擴展標記語(yǔ)言(XML),建立適用于熱工水力安全分析系統程序RELAP5的組件模型庫。
- Your handwriting could be the best form of online security, say the developers of a new system that may one day replace difficult-to-remember passwords and PIN codes. 種新系統的開(kāi)發(fā)人員稱(chēng),個(gè)人筆跡可以成保障在線(xiàn)安全的最佳方式,該系統有朝一日可能會(huì )取代難記的密碼和個(gè)人身份識別碼。
- When she arrived at Wharton, we had a desperate need for someone to teach a class in “Security Analysis”. 非但如此,作為揚州人的夏一紅,皮膚黝黑,面容嬌麗,還有“黑里俏”之譽(yù)。
- The paper provides An integrated direct method for power system dynamic security analysis, i.e., the PEBS/BCU method, is put forward in this paper. 提出一種用于電力系統動(dòng)態(tài)安全分析的綜合直接法,即 P E B S/ B C U 方法。
- Is the Graham and Dodd "look for values with a significant margin of safety relative to prices" approach to security analysis out of date? 格雷厄姆與多德追求“價(jià)值遠超過(guò)價(jià)格的安全保障”,這種證券分析方法是否已經(jīng)過(guò)時(shí)?目前許多撰寫(xiě)教科書(shū)的教授認為如此。
- The security analysis makes it clear that this scheme has the characters of uniqueness, irreversibility and undeniableness. 安全性分析表明,此方案具有需要的唯一性、不可篡改性和不可否認性等特性。
- Phishing - the act of falsifying the identity of a known brand or organisation to steal personal details - is one of the biggest threats to personal online security, according to AOL. 根據AOL統計,網(wǎng)絡(luò )釣魚(yú)即假借知名公司的名義對電腦用戶(hù)進(jìn)行詐騙,盜取用戶(hù)個(gè)人信息的行為是個(gè)人網(wǎng)絡(luò )安全的最大威脅。
- Through the security analysis,the scheme satisfies the following properties:Existential unforgeable,signer ambiguous,linkable and verifiable. 通過(guò)安全分析,該方案滿(mǎn)足存在不可偽造性、簽名者匿名性、可關(guān)聯(lián)性、可驗證性等特點(diǎn)。
- The security analysis of the schemes shows that they have the property of unforgeability,source hiding and privacy of signer's identity. 安全分析表明它們具有不可偽造性、簽名源的隱匿性和簽名者身份的匿名性。
- Tnis measure method supplies reliable data for security analysis and designing installed flange of steam turbine' s vane. 此項技術(shù)可為汽輪機葉片安裝輪緣的設計和安全性分析提供可靠依據。
- Quantitative Analysis A security analysis that uses financial information derived from company annual reports and income statements to evaluate an investment decision. 定量分析指利用公司年報及損益表提供的財務(wù)資料作出投資決策的證券分析方法。
- Quantitative Network Security Analysis Finally, we have also developed a preliminary analysis of the technical requirements for effective worm countermeasures. 最后,對高效的對付蠕蟲(chóng)的策略的技術(shù)要求我們已經(jīng)作了初步的分析。
- Quantitative Network Security Analysis In related work, we have used a similar approach to monitor the spread of Internet worms such as CodeRed and Nimda. 最近,他們還使用了類(lèi)似的方法來(lái)監控互聯(lián)網(wǎng)的病毒,比如紅色代碼和尼姆達。
- Quantitative Network Security Analysis The potential impact of this proposal is the creation of an empirical dataset that describes large-scale attacks across the global Internet. 我們還會(huì )創(chuàng )建一個(gè)經(jīng)驗數據集,描述全球互聯(lián)網(wǎng)的大規模攻擊。