安全的
- 与 安全的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
From the viewpoint of information security, the architecture of tactical C3I systems is analyzed, and the four types of information domain are presented, including intelligence processing domain, information sharing domain, commanding decision domain and information feedback domain.
从信息安全的角度分析了战术C3I系统的体系结构,提出了系统包含的4种信息域,即情报处理域,信息共享域,指挥决策域及信息反馈域。从信息域成员的角色及其特权、对信息客体的保护及域间信息传递策略等方面研究了信息域安全策略。
-
In the face of above cases, this paper attempts to break through the bottleneck of data security with another way. Through study of Error Correction Code and Finite Field theoretics, this paper tries to apply the Reed-Solomom arithmetic based on Finite Field Galois Field to Redundant Array of Independent Disk, and tries to realize a simple RAID6 level programme, thereby could offer an idea for securer storage device.
面对这样的现实情况,本文试图换个角度突破这个安全瓶颈,通过对纠错编码理论及有限域数学理论的一步步深入研究,尝试将基于有限域数学的Galois域Reed-Solomon算法应用到RAID(Redundant Array of Independent Disk 独立冗余磁盘阵列)磁盘阵列当中,并尝试实现小型的RAID6级别的实验程序,从而为实现更加安全的存储技术提供了思路。
-
Then behind that credit card, if you want to get into secure locations, be it a nuclear power plant or an airport or busy commercial airport, you have to put your ID card in a reader, put your thumbprint or handprint on a reader and we verify you are who you say you are by having this national database, national security database.
这样,用这张信用卡,如果你想进入安全的地方,比如核能厂、机场或繁忙的商务机场,你得将卡插入检验机,将你的拇指指纹或手印输入检验机,通过我们的全国数据库--全国安全数据库,我们就可以检验你的身份。
-
This article analyses the actual reality of network security and briefly intruduces a few of aggressive measures which threaten the safety of network. From these we can see, the passive ways such as firewall and anti-virus software to combat network attack can not meet the increasingly needs of network accessing .As a result, an intrusion detection system must be established to differentiate between the legal accessing and inbreaking attack. That is intrusion detection.
本文首先分析了目前的网络安全现状,简单介绍了几种威胁网络安全的攻击手段,从中可以看出通过防火墙和杀毒工具等软件,被动地防御网络攻击已经不能满足日益增加的网络访问量了,因此必须变被动为主动,对到达的网络访问内容进行审核,来判断是合法的访问还是入侵攻击,这种审核就是入侵检测。
-
D. Pointcheval, and J. Stern. Security proofs for signature schemes. Advances in Cryptology-Eurocrypt '96, LNCS1070, 387-398, Springer-Verlag, 1996. 4. 4. Y. Watanabe, J. Shikata, and H. Imai. Equivalence between semantic security and indistinguishability against chosen ciphertext attacks. PKC 2003, LNCS 2567, 71–84, Springer-Verlag, 2003. 5. 5. M. Bellare, R. Canetti and H. Krawczyk.
课内教学活动深入理解可证明安全的基本思想和原理,灵活使用可证明安全的方法和工具分析典型的密码方案,培养和锻炼严密的逻辑思维能力和书面表达能力;流利的口头讲解能力和学术辩论能力;强烈的探索创新能力和团队合作能力。
-
Second, plasticizers industry trends: the main production of plasticizer tends to continuous large-scale production, and special plasticizers tend to many varieties, small batch intermittent production; products, traditional, low-cost, security risk phthalate plasticizers are being new, safe but relatively high prices of citric acid ester plasticizers, trimellitic acid plasticizer replaced this trend performance in foreign markets significantly, and domestic prices because of factors, phthalate plasticizers will be substantial use.
二、增塑剂行业发展趋势:生产方面主增塑剂趋于连续化大生产,而特殊增塑剂趋于多品种、小批量间歇生产;产品方面,传统的、廉价的、安全风险大的邻苯二甲酸酯类增塑剂正在被新型的、安全的但价格相对较高的柠檬酸酯增塑剂、偏苯三酸类增塑剂所取代,这一趋势在国外市场表现显著,而国内由于价格因素,邻苯二甲酸酯类增塑剂仍将被大量使用。
-
My request is seeking your direct participation to front you as (foreign agent/investment partner) to travel to Canada and secure the funds for onward redirection into any of your designated safe offshore bank account either in or outside of your country for disbursement and investment purposes.
我的要求是寻求您的直接参与前线你前往加拿大和安全的资金再重定向到任何您指定的安全离岸银行帐户无论是在或不在您的国家拨款和投资用途。
-
Superconducting magnetic energy storage can quickly respond to the power requirements of power system, which will improve the security and stability of power grid.
本文在简要论证电力安全的重要性的基础上,对SMES提高系统的安全稳定性的优越性进行了分析,并介绍了国家863计划项目"高温超导磁储能系统"的工作进展。
-
This application required several features in order to provide a safe working environment. From programmable electroniccontrollers to bulletproof safety glass, Paling manufactured this equipment to the specific needs of their client.
为提供一个安全的工作环境,叉车的适用需要一些特别的性能,从程序化的电子控制到防弹的安全镜,Paling能够制造出满足其客户特殊需求的产品。
-
Finally this thesis analyses the efficient revocable group signature scheme with forward security proposed by Chen Shaozhen and Li Daxirig. An adversary can personate a legal group member by forge a group membership certificate, and then can forge group signatures that can be verified by a verifier. And the group manager can also forge group signatures that can be verified by a verifier. So the scheme is insecure. Meanwhile, there are redundancy steps in the scheme, thus the efficiency is low.
接着,对陈少真和李大兴提出的一种有效取消的前向安全群签名方案进行了密码学分析,一方面,攻击者可以通过伪造群成员证书来伪造能够通过验证的群签名;同时,群管理员也可以伪造一个可以通过验证的群签名,因此,该群签名体制是不安全的;另一方面,该体制存在冗余数据。
- 推荐网络例句
-
The split between the two groups can hardly be papered over.
这两个团体间的分歧难以掩饰。
-
This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.
这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。
-
The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.
聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力