繁體版 English FrancaisРусский
登录 注册

可信计算

"可信计算"的翻译和解释

例句与用法

  • Performed on trusted computing platform , the protocol designed in this paper compares with the traditional security protocols , the computing speed is faster , the perform efficiency is higher , the information transfer is more safe
    本文设计实现的协议应用在可信计算平台上与传统的安全协议相比数据计算速度更快、协议执行效率更高、信息传输更安全。
  • As software drives more of the devices we use every day and cyber criminals continue to find new ways to disrupt , vandalize and steal on the internet , helping ensure security remains a critical part of trustworthy computing
    鉴于我们每天使用的设备越来越多的已经由软件驱使以及继续花样百出的电脑犯罪,在互联网上搞破坏和行窃,协同确保安全依然是可信计算的关键任务。
  • Otherwise , bnuisms introduced the concept of orient terminal trusted computing which is the trend of development of information security technologies . by strengthening the defence ability of terminal , bnuisms enhanced the whole system ’ s security defence level
    此外,系统还全面采用面向终端的“可信计算”的概念,通过端系统软件加强了端系统的防护能力,并全面提高了系统的安全防护水平。
  • We construct the model of security protocol based the trusted computing platform . 2 . in the analysis of this new protocol , we take the network attack for validate , and also use the formalized method to prove protocol security theoretically
    在本文的研究过程中,主要取得了以下一些研究成果: 1 .建立了基于可信计算平台的安全协议模型; 2 .在对协议进行分析的过程中,除了使用攻击验证外,还使用了形式化分析的方法,在理论上证明了协议的安全性。
  • Taking the current security protocol to use in trusted computing platform directly without modify , this process can ensure the communications security but do not take the advantage of trusted computing platform . the perform efficiency is low , and this can ’ t complete authentication of platform
    如果把目前的安全协议不加以修改就直接用在可信计算平台上,虽然可以保证通信安全但是没有发挥出可信计算平台的优势,协议的执行效率不高,而且也无法完成对平台的认证。
  • The conc9pts and approaches relating to information security among the course of development of the ia are introduced . for example , reference monitor ( are ) , reference validation mechanism ( rvm ) , trusted computing base ( tcb ) , security model , tcsec , cc , iatf fritsa , etc . chapter 2 analyzes the time and space property " of information security
    第一章对信息保障的历史进行回顾,介绍在信息保障的发展历程中有关信息安全的概念和方法,如:引用监视器( rm ) 、引用确认机制( rvn ) 、可信计算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。
  • 更多例句:  1  2  3
用"可信计算"造句  
英语→汉语 汉语→英语