英语人>网络例句>in security 相关的网络例句
in security相关的网络例句

查询词典 in security

与 in security 相关的网络例句 [注:此内容来源于网络,仅供参考]

Last year December, carry on promotes prefectural public security bureau to receive the Ministry of Public Security suddenly to turn a case that come down, there is 17 to seal what send from countrywide each district to inform against a letter in this case material, same individual was pointed to in the letter -- net name " blue sky lanneret ", the Xiao Mou that lives in carry on to promote prefectural blessing to be pressed down completely.

去年12月,绍兴县公安局突然接到公安部转下来的一个案件,该案材料中有17封从全国各地寄来的举报信,信中都指向了同一个人——网名"蓝天雄鹰"、住在绍兴县福全镇的肖某。

Due to tighten security and permission control in Windows Vista, coupled with new virtualization system, although eMule can install properly in Vista, eMule users may run into some problems such as unable to find finished downloaded incoming files, low ID, slow download speed, no minimize to tray button, downloads stuck incomplete at 99% and the famous "EventID 4226: TCP/IP has reached the security limit imposed on the number of concurrent TCP connect attempts" in Event Viewer error.

由于加强保安和许可控制在Windows Vista中,再加上新的虚拟系统,虽然emule可以正确安装在Vista , emule的用户可能会遇到一些问题,如无法找到完成下载的文件传入,低身份证,缓慢的下载速度,没有尽量减少到托盘按钮,下载坚持不完全统计,在99 %和著名的" eventid 4226 : TCP / IP协议已达到了安全限制加诸于大量并行的TCP连接尝试"在事件查看器的错误。

Analyzing EU's common foreign and security policy mechanism may provide a definite case for promoting theory of regional political integration. Similarly, undertaking the study can prefigure the political pattern in the future, for whether EU can become a pole consists in whether its common foreign and security policy mechanism will bring real political integration in Europe.

对欧盟共同外交与安全政策机制进行分析,可以为区域政治一体化理论发展提供实例参考;同样,也有利于预见未来国际政治格局的形式,因为欧盟是否能成为国际格局中的一极就在于其共同外交与安全政策机制是否能真正实现欧洲政治一体化。

In this thesis, we investigate and show how to achieve both practical and general zero-knowledge systems that can be securely run in concurrent and resettable settings with both concurrent prover security and concurrent verifier security in general public-key models.

因为零知识证明系统在当代密码学中处于中心的位置,并且由于Internet以及Internet上基于智能卡的电子商务的广泛普及和大规模应用,我们的工作具有极其重要的理论和实际意义。

The fourth aspect is about authentication protocols analysis in special systems. We gave out the security analysis of AKE protocol and reauthentication protocol in the POD copy protection specification. We also gave out the security analysis of AKE protocols in DTCP specification.

在特定系统中认证协议分析方面,给出了配置点拷贝保护系统中认证密钥交换协议和重新认证协议的安全分析;给出了数字电视拷贝保护规范中的完全认证协议的安全分析。

Article 268 In the case of an application or request for recognition and enforcement of a legally effective judgment or written order of a foreign court, the people's court shall, after examining it in accordance with the international treaties concluded or acceded to by the People's Republic of China or with the principle of reciprocity and arriving at the conclusion that it does not contradict the basic principles of the law of the People's Republic of China nor violates State sovereignty, security and social and public interest of the country, recognize the validity of the judgment or written order, and, if required, issue a writ of execution to enforce it in accordance with the relevant provisions of this Law; if the application or request contradicts the basic principles of the law of the People's Republic of China or violates State sovereignty, security and social and public interest of the country, the people's court shall not recognize and enforce it.

第二百六十八条人民法院对申请或者请求承认和执行的外国法院作出的发生法律效力的判决、裁定,依照中华人民共和国缔结或者参加的国际条约,或者按照互惠原则进行审查后,认为不违反中华人民共和国法律的基本原则或者国家主权、安全、社会公共利益的,裁定承认其效力,需要执行的,发出执行令,依照本法的有关规定执行。违反中华人民共和国法律的基本原则或者国家主权、安全、社会公共利益的,不予承认和执行。

Shenzhen dexin Security Technology Co., Ltd., established in 1993 and a member of Chint Dexin Group, is an enterprise specialized in the research, development, and production of national defense and security equipment, with its products mainly applied in army and key units of the State.

德信安保科技有限责任公司,成立于1995年,是一家专业从事国防保全设备研发、生产的专业企业,产品主要应用于部队等国家重要单位。

The mobility and wireless links bring some problems which won't occur in lineate networks. Some technologies about security that used in lineate networks frequently become useless. In order to resist the attacks, we can take some traditional preventive measures, such as encryption and validation, but it's not enough for the security of MANET, because it can only reduce, not eliminate the attacks.

要抵抗对Ad Hoc网络的袭击,可以采用一些传统的入侵预防技术,比如加密和鉴权,但是入侵预防技术只能减少袭击的发生,不能完全消除袭击,因此,有必要引入入侵检测技术,在袭击的早期阶段就收集足够的袭击证据,采取相应的抵抗措施,使侵害损失大大降低。

In this thesis, we investigate and show how to achieve both practical and general zero-knowledge systems that can be securely run in concurrent and resettable settings with bothconcurrent prover security and concurrent veri?er security in general public-key models.

在本学位论文中,我们研究和显示如何在广义公钥模型下构造实用的及一般的同时具有并发证明者安全和并发验证者安从而可以在并发及可重置环境中安全运行的零知识系统。

On the basis of application of traditional information security technology, GAP solution is designed and realized in order to make a clean sweep of the latent information security problem in the Networked Manufacturing environment in the paper.

在将相关信息安全技术应用于网络化制造中的基础上,提出应用物理隔离技术到网络化制造信息安全领域中,试图最大限度地消除网络化制造系统存在的安全隐患。

第27/100页 首页 < ... 23 24 25 26 27 28 29 30 31 ... > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。