security protocols
基本解釋
- 安全協(xié)議(security protocol的復(fù)數(shù))
英漢例句
- Set up document exchange protocols and security protocols.
建立文檔交換協(xié)議和安全協(xié)議。 - Typical examples include logging data about the request or response, processing security protocols, managing session attributes, and more.
典型的例子包括記錄關(guān)于請求和響應(yīng)的數(shù)據(jù)、處理安全協(xié)議、管理會話屬性,等等。 - The advantage of this approach is that all the data sources and processing centers don't have to establish unique security protocols, nor must they reauthenticate on every request for data.
這種方法的優(yōu)點在于,所有數(shù)據(jù)源和處理中心都不必建立獨特的安全協(xié)議,也不必重新對每個數(shù)據(jù)請求進行身份驗證。 - Integrating the TNC architecture with widely used security protocols will increase the value still further.
FORBES: Creating Security from the Inside Out - You would be too if you spent your life integrating data, writing apps and testing security protocols.
FORBES: Would You Let Your Employee Bite Someone? - For agent.btz to show up on government computers does underscore that even the military may have lax security protocols.
FORBES: Magazine Article
雙語例句
權(quán)威例句
詞組短語
- security transfer protocols 安全傳輸協(xié)議
- dynamic security protocols 動態(tài)安全協(xié)議
- Multicast security protocols 組播安全協(xié)議
- security analysis of protocols 協(xié)議安全性分析
- security protocols design 安全協(xié)議設(shè)計
短語
專業(yè)釋義
- 安全協(xié)議
The method of model checking has shown its advantage in the verification of security protocols.
模型檢驗方法在對安全協(xié)議的驗證中體現(xiàn)出了巨大的優(yōu)越性。電子、通信與自動控制技術(shù)
- 安全協(xié)議
Hash functions and block ciphers play an important role in many cryptographic and security protocols.
雜湊函數(shù)和分組密碼在很多密碼安全協(xié)議中起著非常重要的作用。