security analysis 中文意思是什麼

security analysis 解釋
安全分析
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • analysis : n. (pl. -ses )1. 分解,分析;【數學】解析。2. 梗概,要略。3. 〈美國〉用精神分析法治療(= psychoanalysis)。
  1. Security analysis of the accounting by edp system

    會計電算化系統的安全性分析
  2. Security analysis of the ieee 802. lx protocol

    協議的安全性分析
  3. Reliability and security analysis of 3 - module redundancy system with one maintainable unit

    可維修三模冗餘結構系統的可靠度與安全度分析
  4. 7 a multi - round online auction system ( with seal bids ) based on mobile agent is proposed and a security analysis of the system is present

    7設計了一個應用移動代理技術實現的密封投標式的多輪在線拍賣系統。該方案滿足拍賣需要的各種安全要求。
  5. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算機信息系統安全體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態防禦以及協同通信平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算機信息系統安全體系建設的動態縱深防禦安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全防護層次的概念,提出了信息類別、威脅級別和安全保障級別的定義,闡述了進行計算機信息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技術的分級要求,從而便於進行計算機信息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於保障上述安全體系動態協同能力的協同通信平臺。
  6. Concentrating on security analysis and design of block ciphers, five principal achievements have been obtained in this dissertation : 1. using differential - nonlinear cryptanalysis, truncated differential - linear cryptanalysis and integral cryptanalysis respectively, three attacks of reduced - round safer + + are given ; 2. based on the survey of provable security and practical security of block ciphers, a block cipher model of spn cipher containing feistel structure is proposed

    分別利用差分-非線性密碼分析、截斷差分-線性密碼分析、積分密碼分析三種不同的密碼分析方法,對safer + +進行了密碼分析; 2在對分組密碼的可證明安全性和實際安全性研究的基礎上,提出了一個嵌套feistd結構的sp型分組密碼的模型。
  7. In this paper, the belief logic system gny and it ' s related implementation tool spearii are utilized, ssl protocol is a focused instance, then the detailed analysis procedure from initial protocol model to various evolution protocol models is given, later the final evolution protocol model and ssl protocol are contrasted and thus the security analysis conclusion is drawn for ssl. during the analysis procedure two practical security authentication solutions are designed based on evolution protocol models

    本文採用著名的信念邏輯gny邏輯系統及其相關的形式化工具spear ,以ssl協議為分析實例,詳細闡述了從初始協議模型到各個進化協議模型的分析過程,並將最終的進化模型與ssl協議作比較,給出ssl協議的安全分析,同時在分析過程中以協議模型為基礎設計了兩個實用的安全認證方案。
  8. The first step is to select the proper biometric features, and the fingerprint and facial are chosen. then the second step is to select the ic type, through analysis, philips p8rf5016 is chosen. based on security analysis, the basic structure and main function of the passport system are designed

    論文首先對生物特徵技術的性能進行了分析,然後選擇了指紋和面像技術作為電子護照的應用,其次是進行ic晶元的選型,通過分析,選擇了philipsp8rf5016晶元,第三對系統進行了安全分析,針對安全分析,進行了系統的總體設計,包括系統的基本構成,主要功能和各部分功能的確定等等。
  9. Security analysis of ku - chien ' s remote authentication scheme

    遠程身份認證方案的安全性分析
  10. The basic software consists of topology analysis, on - line load flow computation, state estimator, security analysis, dispatchers training simulator, short circuit current computation, and voltage / reactive power optimize, etc. the derived softwares consist of load control, capacitor optimizer configuration, transformer and feeder load distribution, impedance computation of generator, etc. network analysis software is powerful dispatch tool, though witch the current state of the power system can be realize, then improve the security and economic potential

    Dms網路分析的基本軟體有:網路結線分析、潮流計算、狀態估計、負荷預報、短路電流計算、電壓無功優化等。派生軟體有:負荷控制、電容器優化配置、變壓器與饋線負荷分配、電源阻抗計算等。網路分析軟體是有力的調度工具,通過它可以了解和掌握當前的運行狀態,從而挖掘安全和經濟方面的巨大潛力。
  11. This paper provides security analysis of a mutual authentication and key establishing protocol based on elliptic curve cryptography for wireless communication, which can withstand the above attacks and can be used in wireless terminals

    在結合橢圓曲線密碼體制優點的基礎上,提出一種適于無線通信網路中的相互認證和密鑰建立協議,不僅能有效防止上述攻擊,還適于在無線終端設備上應用。
  12. Security analysis and investment

    證券投資學
  13. A new idea was provided for security analysis with the appearance of the feltham - ohlson valuation model

    費森?奧爾森估值模型的出現為證券價值分析提供了新的思路。
  14. Security analysis of public - key cryptography based on chaotic attractors of neural networks and its implementation

    基於神經網路混沌吸引子的公鑰密碼演算法安全性分析及其實現
  15. Mandatory access control modeling and security analysis : a petri - nets based method

    網的強制訪問控制模型及其安全分析
  16. Some contingency screening and ranking algorithms for voltage security analysis are reviewed. based on that, a new method is proposed

    論述了幾種主要故障選擇和篩選的演算法,在此基礎上進行了改進,提出了一種新的演算法。
  17. In 1943, with the publication of a book named " security analysis " written by benjamin graham and david dodd, the value investment theory is born. the theory holds that only the investment in quilts which are underestimated by market or which have growing up value are safe. benjamin graham has proposed " safe limit " as the criterion of investment judgment

    價值投資理論是伴隨著本傑明?格雷厄姆和大衛?多德在1934年出版的《證券分析》一書而誕生的,價值投資理論認為:只有投資那些被市場低估其價值或本身存在成長性價值的公司股票才是安全的,本傑明?格雷厄姆提出了「安全邊際」作為投資的評判標準。
  18. Security analysis and responsive strategy of scada system

    系統的安全性分析及對策
  19. The security analysis to balanced shrinking generators

    平衡收縮序列的安全性分析
  20. Installation and security analysis of library ftp server

    服務器的建立和安全分析
分享友人