您要查找的是不是:
- Another security requirement is a digital certificate. 另一个安全要求是数字证书。
- Implement fire protection and security requirement that from government, assist Supervisor. 协助主管,在工厂内执行政府在安全和消防方面的要求。
- The right choice depends on the level of security required. 正确的选择依赖于对安全要求程度的高低。
- In particular, in business transactions among enterprises, the security requirement of non-repudiation needs to be satisfied. 特别是在企业间的商业交易中,不可抵赖性的安全性要求需要得到满足。
- The recommended value should be 15 minutes or even lower, depending on time source, network condition, and security requirement. 根据时间源、网络状况和安全要求的不同,建议将该值设置为15分钟或更低。
- Consider the security requirements of the functional application. 考虑功能性应用程序的安全需求。
- System security administrators can describe multiple security policies based on security requirement of practical application and in this way finishes the access to database. 本文采用类似无函数的扩展逻辑程序的表示方法对数据访问进行形式化描述,由系统安全管理员根据实际应用的安全需求来描述多种安全策略,进而完成对数据库的访问。
- Therefore once the security requirement in single prover condition is satisfied the identity authentication protocol can also be run in multi-provers condition. 因此,只要满足了其中单证明者环境下的安全要求,身份认证协议也能安全地运行在多个证明者的环境下。
- Determine the security requirements that are unique to your environment. 确定具体环境特有的安全要求。
- This chapter describes deployment representations for security requirements. 本章描述安全需求的典型布署。
- Despite security targets of wireless network,MANET has not only its special security requirement,but also additional vulnerabilities and features pertinent to this networking paradigm. 移动自组网络除了要达到传统有线网络中的安全目标外,还有自身特殊的安全需求,而它的特性又使之容易遭受各种攻击。
- Simulation results in NS-2 shows this approach based on FSM and SVM method can achieve desired precision and performance and meet the security requirement of mobile Ad Hoc network. 通过NS-2网络仿真实验表明:基于FSM和SVM相结合的混合入侵检测机制具有较高的检测精度和检测性能。
- Most packet-filtering technologies have not addressed all security requirements. 多数包过滤技术没有满足所有的安全要求。
- A secure elliptic curve, combined threshold scheme, verifiable secret share scheme with proactive secret share scheme is selected to make sure security requirement. 本文基于安全的椭圆曲线,结合门限体制、可验证秘密共享体制以及主动秘密共享方案,给出一种新的入侵容忍签字方案。
- Depending on your application,Oracle9iAS Wireless supports techniques to satisfy your end-to-end security requirements. 根据应用程序的不同,Oracle9iAS Wireless 支持不同的技术来满足端对端的安全需要。
- The techniques described above allowed the team to secure specific pages to meet the customers security requirement in an efficient and maintainable manner. 上述技术允许团队用一种有效和可维护的方式保护特定页面以满足客户的安全需要。
- First, you must strive to build as simple a system as possible, while still meeting your security requirements. 首先,您必须努力构建尽可能简单的系统,同时仍然要满足安全性需求。
- Passengers cooperation in complying with all security requirements will ensure safe air travel for all. 旅客遵照所有保安规定,有助保障航空旅行的安全。
- Establishing security requirements Introduction evaluation and review of security policy. 建立安全政策的介绍评价和回顾。
- For more information about ASP.NET security requirements, see ASP.NET Debugging: System Requirements. 有关ASP.;NET安全要求的更多信息;请参见ASP