secure computing 中文意思是什麼

secure computing 解釋
電腦安全性能雜志
  • secure : adj ( curer; curest)1 安心的;不必擔心的;有把握的。 2 可靠的。3 安全的。4 堅固的;牢固的。5 必...
  1. This independence makes strongbox ideal for the secure deployment of embedded systems, computing clusters, enterprise linux deployments, secure web servers, pbx systems, and kiosk systems

    這一獨立特性使得strongbox成為安全地部署嵌入式系統、計算機集群、企業linux部署、安全的web服務器、 pbx系統以及kiosk系統的理想選擇。
  2. By ray spencer secure computing corporation, stephen smalley, peter loscocco national security agency, mike hibler, david andersen, and jay lepreau university of utah

    (完整地輸入)並且在被提示時輸入密碼短語(如果正在使用) 。您可以用這樣的方式生成所有可能的公鑰私鑰對。
  3. The constructed embedded linux operating system has been successfully applied in the spcc ( secure personal computing center ), which is a trust mobile device produced by shanghai wellhope information and technology co. ltd

    本文所構造的嵌入式linux操作系統已經在上海維豪信息技術有限公司的電子政務項目的一個可信無線終端設備? ?安全個人計算中心spcc中的安全模組里得到了應用,並取得了比較好的效果。
  4. Previous protocols for determining whether a point is inside a circle are not secure enough. we present a two - round protocol for computing the distance between two private points and develop a more efficient protocol for the point - circle inclusion problem based on the distance protocol. in comparison with previous solutions, our protocol not only is more secure but also reduces the number of communication rounds and the number of modular multiplications significantly

    保護私有信息的計算幾何問題是一類特殊的安全多方計算問題, attalah等首先提出了安全多方計算幾何的概念,介紹了點的包含多邊形相交判定最近點對及凸包問題,並分別基於茫然傳送協議及置換協議設計了兩個不同的點積協議,在此基礎上提出了解決點在多邊形中的包含判定及兩個多邊形相交判定的初步方法,但正如作者所指出,其方法還不夠完善,協議效率有待進一步改進。
  5. So it is appears important to analyse capability of this structure, the people can compute all kinds of complex structure ’ s response under different sorts of exact load on current software, but the source program of the computing question, which is “ black box ”, on the contrary, fepg can get the source program, which can provide preference for the optimization of structure, even embed in the optimizing program and save much time of compiling program, linking to ga to identify the load can get the good result. so the problem is solved to alleviate the deadweight and the optimize design of the structure, as well as improve its secure capability

    對格柵結構進行力學分析就顯得至關重要,盡管利用通用有限元軟體能夠計算結構承受任意可以準確描述的載荷作用下的響應問題,但內部計算卻是「黑箱」操作,利用fepg可以得到計算源代碼,能夠為優化程序提供參考甚至可以嵌入其中,節省繁瑣的有限元計算編程內容,結合遺傳演算法進行載荷重構,往往會收到很好的效果,這就解決了由於工作環境比較復雜,引起響應的載荷難以直接測量得到的難題,從而為結構優化設計和提高安全性能的提供了保障。
  6. In the first of this pair of articles, david compares and contrasts secure shell and virtual network computing, two technologies that allow a user at one workstation to run an application that lives on another computer

    在這兩篇文章的第一篇中, david比較和對照了「安全shell ( ssh ) 」和「虛擬網路計算( vnc ) 」 ,這兩種技術允許用戶在一臺工作站上運行位於另一臺計算機上的應用程序。
  7. Since retiring from ibm, he has participated in the itso austin architecting secure systems with tivoli products and the introduction to grid computing with globus residencies as an it systems consultant for ibm business partners. carlos alexandre queiroz is an independent consultant working for alex microsystems

    從ibm退休之後,作為ibm商業合作夥伴的it系統顧問,他曾參與itso austin architecting secure system的tivoli產品的研究工作,並在研究網格計算之前先進行了globus的高級培訓。
  8. The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain

    授權數據是由那些屬于系統中可信計算基礎的服務器頒發的,因此在它所管理的域中可以認為是安全的。
  9. The purpose of this computer virus code of ethics is to show commitment towards ethical computing, to promote safe and secure computing, to set ethical standards by which we can judge each other, and to provide leadership among computer users and the computing community

    該計算機病毒道德準則的目的是,承諾從事合乎道德規范的電腦工作,促進電腦工作安全可靠,並制定可以相互評價的道德標準,並為電腦用戶和電腦團體提供指導。
  10. 10 goldwasser s, micali s, rivest r. a digital signature scheme secure against adaptive chosen - message attacks. siam journal of computing, 1998, 17 : pp. 281 - 308

    值得注意的是,雖然rsa問題與整數分解問題密切相關,但是基於rsa假設構造變色哈希函數的的方法並不能直接用來構造基於整數分解假設的同類方案
  11. This thesis try to study the modal of p2p and its application. the thesis firstly gives the definition of the p2p technology, and try to classify the p2p modals. by researching the existing p2p applications and softwares ' s implementation, this thesis want to conclude their different implementary modals, their merits and their shortcomings, and also study deeply to their inner mechanisms. and it gives and implements a basic framework of multicast discovery modal using java language. then the thesis discusses how the p2p computing communicates with each other though many kinds of firewalls and some secure problems in p2p area. the author discusses some practical feasible new methods. at the last part of this thesis, it try to apply this new p2p technology to the traditional instant message software area. that is, it want to build messaging application without a central server using protocol jxta

    論文嘗試研究p2p的模型及應用。文章首先概述了p2p的定義,分類和應用范圍等一系列問題;然後試著從現有的各種p2p應用中,分析總結出其不同的實現模型,考察其內部機制,以及各種模型的優缺點;還用java語言實現了其中多播模型的基本框架;接著論文闡述了對等計算如何穿透防火墻而實現通信以及安全性,探討了幾種作者認為行之有效的新技術。論文的最後,把新的p2p技術應用到傳統的即時通信應用軟體領域,即在jxta協議的基礎上構建不需要任何中心服務器的通信應用。
  12. Secure computing paradigms impose new architectural challenges for general - purpose processors

    安全計算範式向通用處理器提出了新的體系結構上的挑戰。
  13. While the p2p domain might seem exciting and new, the elements of secure computing in a distributed environment remain the same

    雖然p2p領域可能看起來是令人激動的和全新的,但在分散式環境中安全計算的要素卻還是原樣。
  14. They can cost more than $ 1 million each, but they retain a strong presence in companies that need extremely reliable and secure computing

    雖然這些大型機每臺的價值都超過100萬美元,但在一些要求極端的計算可靠性和安全性的公司,它們仍發揮著重要作用。
  15. As far as kasumi algorithm is concerned, we get the maximum probability of differential and linear through computing the s7 box and s9 box ' s differential and linear probability. thus, we prove it is secure against differential and linear cryptanalysis

    在kasumi演算法的分析中,首先計算出s7盒與s9盒的最大差分概率和最大的線性概率,最後計算出整個演算法的最大差分概率和最大線性概率,進而證明了該演算法是抗差分分析和線性分析的。
分享友人