您要查找的是不是:
- trusted computing PC 可信计算机
- How Trustworthy Is Trusted Computing? 可信计算有多可信赖?
- Cybersecurity and Domestic Surveillance or Why Trusted Computing Shouldn't Be? 数字安全与国内监督,或为何原本可信的计算机面目全非?
- Lev has also worked in the areas of application security and trusted computing. Lev也从事于应用程序安全和可信的计算方面的研究。
- Trusted Computing is one of the hottest topics in the information security field. 可信计算是目前信息安全领域研究的热点问题之一。
- With the technique of trusted computing,dsigned and implemented the mechanism of resisting malic... 利用可信计算技术设计并实现恶意代码防御机制。
- Private computers are also known as trusted computers. 私人计算机也称为受信任的计算机。
- The traditional method for establishing a TPM system is based on a security chip fixed on the main-board,so the PC without a security chip can’t obtain the “trusted compute” objecting terminal. 谈到信息系统安全,人们马上会想到防火墙、入侵检测和防病毒等传统安全手段。
- We first introduced the TPM hardware structure, several focus points of Trusted Computing and HMAC and SHA-1 algorithms. 文章首先介绍了可信计算若干关键技术、TPM硬件结构以及HMAC、SHA-1算法。
- Trusted computing in this form is the ultimate reversal of the human-centric, loosely-coupled design approach of the Internet. 这种形式的可信任计算完全反转了以人为中心、松散结合的互联网设计理念。
- Today the personal computer(PC) is widely used, which is a kind of microcomputer. 今天人们广泛使用的个人计算机(PC)是一种微型计算机。
- The difference of MTM and TPM on the security model is compared,then the process implementing trusted computing is given. 比较了MTM和TPM在安全模型上的区别,给出了实现可信机制的过程。
- One of the Trusted Computing Group(TCG) infrastructure is credential system,which participates in trusted chain of transmission process. 证书体系在可信计算中具有基础支撑作用,它参与完成了信任传递的整个过程。
- When we get the case, the team will gather together to discuss it, make a calculation and use computer pc to make drawing.Incl. other detail things. 当接到个案,设计小组会聚在一起讨论、计算,然后以最合理、最好的方案,在电脑上作设计图面,以及准备其它的细部事项。
- The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain. 授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
- Trusted Computer System Evaluation Criteria(TCSEC), DOD5200.28-STD Dec 1985. 行政机关资讯系统安全稽核制度之研究;1996;行政院研考会编印.
- Those standards talks are still ongoing at the IETF, which so far is following the standards mapped out by the industry consortium Trusted Computing Group. 这些标准的谈判仍在进行,在IETF的,而这一点至今是以下的标准,制定了由工业财团的信任计算工作组。
- In order to use trusted computing technology in video surveillance system, a scheme of video surveillance server embedded TPM is designed in this paper. 本方案通过视频监控服务器内嵌可信计算平台模块TPM,将可信计算技术引入到视频监控系统中。
- Taylorism, the Bell system, and trusted computing are all efforts to remove human agency from action and replace it with well-designed, tightly-bound systems. 泰勒主义(Taylorism)、贝尔制度(Bellsystem)和可信任计算试图移除操作中的人类自主力量,并代之以设计完备、紧密结合的系统。
- Maintenance of PC is in my element. 我对电脑的维修保养很在行。