您要查找的是不是:
- Online security is being built in to the system, not tagged on. 联机安全措施正被內置在系统中,不是外加的。
- Backup, store and share files online securely. 备份档案储存及网上互通共享。
- You can have substantially stronger online security by taking a few more steps, which are simple and straightforward. 你只需依照简易直接的步骤,便能大大提升网上交易的安全。
- Finally , we give a simple security analysis of the protocol to show that it fulfils these requirements . 最后,对该协议进行了简要的安全分析,证明它能够满足这些安全要求。
- Make out a set of careful online security schemes. And the network department does freemaintenance and maintenance for the customer in unit hardwareof the computer and software,. 苏州安琪计算机网络工程有限公司。
- We perform a security analysis and heuristically argue that the protocol obtains all desired security attributes. 随后,我们提出了第一个无证书三方密钥协商协议。
- Visual modelizaton and XML was used to build a thermo-hydraulics security analysis model library for RELAP5 programme. 摘要采用可视化建模技术及可扩展标记语言(XML),建立适用于热工水力安全分析系统程序RELAP5的组件模型库。
- Your handwriting could be the best form of online security, say the developers of a new system that may one day replace difficult-to-remember passwords and PIN codes. 种新系统的开发人员称,个人笔迹可以成保障在线安全的最佳方式,该系统有朝一日可能会取代难记的密码和个人身份识别码。
- When she arrived at Wharton, we had a desperate need for someone to teach a class in “Security Analysis”. 非但如此,作为扬州人的夏一红,皮肤黝黑,面容娇丽,还有“黑里俏”之誉。
- The paper provides An integrated direct method for power system dynamic security analysis, i.e., the PEBS/BCU method, is put forward in this paper. 提出一种用于电力系统动态安全分析的综合直接法,即 P E B S/ B C U 方法。
- Is the Graham and Dodd "look for values with a significant margin of safety relative to prices" approach to security analysis out of date? 格雷厄姆与多德追求“价值远超过价格的安全保障”,这种证券分析方法是否已经过时?目前许多撰写教科书的教授认为如此。
- The security analysis makes it clear that this scheme has the characters of uniqueness, irreversibility and undeniableness. 安全性分析表明,此方案具有需要的唯一性、不可篡改性和不可否认性等特性。
- Phishing - the act of falsifying the identity of a known brand or organisation to steal personal details - is one of the biggest threats to personal online security, according to AOL. 根据AOL统计,网络钓鱼即假借知名公司的名义对电脑用户进行诈骗,盗取用户个人信息的行为是个人网络安全的最大威胁。
- Through the security analysis,the scheme satisfies the following properties:Existential unforgeable,signer ambiguous,linkable and verifiable. 通过安全分析,该方案满足存在不可伪造性、签名者匿名性、可关联性、可验证性等特点。
- The security analysis of the schemes shows that they have the property of unforgeability,source hiding and privacy of signer's identity. 安全分析表明它们具有不可伪造性、签名源的隐匿性和签名者身份的匿名性。
- Tnis measure method supplies reliable data for security analysis and designing installed flange of steam turbine' s vane. 此项技术可为汽轮机叶片安装轮缘的设计和安全性分析提供可靠依据。
- Quantitative Analysis A security analysis that uses financial information derived from company annual reports and income statements to evaluate an investment decision. 定量分析指利用公司年报及损益表提供的财务资料作出投资决策的证券分析方法。
- Quantitative Network Security Analysis Finally, we have also developed a preliminary analysis of the technical requirements for effective worm countermeasures. 最后,对高效的对付蠕虫的策略的技术要求我们已经作了初步的分析。
- Quantitative Network Security Analysis In related work, we have used a similar approach to monitor the spread of Internet worms such as CodeRed and Nimda. 最近,他们还使用了类似的方法来监控互联网的病毒,比如红色代码和尼姆达。
- Quantitative Network Security Analysis The potential impact of this proposal is the creation of an empirical dataset that describes large-scale attacks across the global Internet. 我们还会创建一个经验数据集,描述全球互联网的大规模攻击。