您好,欢迎访问优校网! 收藏本页 手机访问
今天是:

isopotal line是什么意思


中文翻译等侵入容量线

网络释义

1)isopotal line,等侵入容量线2)iso-capacity curve,等容量曲线3)intrusion tolerance,入侵容忍4)intrusion tolerance,容忍入侵5)intrusion tolerant,入侵容忍6)intrusion-tolerant,入侵容忍

用法例句

    Design of voting algorithms and synchronous scheme of intrusion tolerance database;

    入侵容忍数据库的选举算法和同步方案设计

    Solution of security database based on multi-layer intrusion tolerance;

    基于多级入侵容忍的数据库安全解决方案

    Digital Signature Based on Elliptic Curve Cryptography and Its Application in Intrusion Tolerance CA;

    基于ECC的数字签名及其在入侵容忍CA中的研究

    Secure intrusion tolerance scheme based on proactive secret sharing;

    基于主动秘密共享的安全容忍入侵方案

    Research of intrusion tolerance middleware model based on interceptor;

    基于拦截器的容忍入侵中间件模型研究

    Design of intrusion tolerance application server based on voting algorithm;

    基于大数表决机制的容忍入侵应用服务器设计

    An intrusion tolerant KDC scheme for multicast communication;

    一种入侵容忍的广播通讯KDC方案

    Research of Realization Approach for Intrusion Tolerant System Based on Combined Strategy;

    基于组合策略的入侵容忍系统实现方法研究

    In this paper an intrusion tolerant CA system was presented.

    提出了一个入侵容忍CA(Certificate Authority,认证中心)系统,在此系统中构造了一个基于椭圆曲线密码体制的(t,n)门限签密方案,该方案是数字签名和公钥加密的有机集成,不仅减少了系统的开销,并使得系统能探测故障服务器和克服签密合成者的欺骗。

    Authentication System with Intrusion-tolerant Feature;

    具有入侵容忍特性的身份认证系统

    Threshold Password-enabled Based on Distribute Intrusion-Tolerant Protect Private Key;

    基于门限加密技术的全分布入侵容忍私钥保护

    The Research and Implementation on Threshold Password-Enabled Based of Intrusion-Tolerant Protect Private Key;

    基于门限加密技术的入侵容忍私钥保护应用研究

    Research and Implementation of the Intrusion Detector for Intrusion Tolerant Databases;

    入侵容忍数据库入侵检测器的研究与实现

    Security Analysis of Intrusition Tolerance System Based on Petri Nets;

    基于Petri网的入侵容忍系统的性能评价

    Research and Design of Web Server Intrusion-Tolerant System;

    Web服务器入侵容忍系统的研究和设计

    Research on the Theory and Applied Technology of Network Intrusion Tolerance

    网络入侵容忍的理论及应用技术研究

    Intrusion-tolerant key distribution scheme based on RSA

    基于RSA的入侵容忍密钥分发方案

    A Survey of Security Quantitative Analysis for Intrusion Tolerant System

    入侵容忍系统的安全性量化方法分析

    Architecture for Database Security Based of Intrusion-tolerance

    基于入侵容忍的数据库安全体系结构

    Model Design of Intrusion Tolerant System Based on Byzantine Protocol

    基于拜占庭协议的入侵容忍系统模型设计

    Threshold Password-enabled Based on Distribute Intrusion-Tolerant Protect Private Key

    基于门限加密技术的全分布入侵容忍私钥保护

    Algorithms of Sequence Analysis and Theirs Applications in Intrusion Tolerance;

    序列分析算法及其在入侵容忍中的应用研究

    Digital Signature Based on Elliptic Curve Cryptography and Its Application in Intrusion Tolerance CA;

    基于ECC的数字签名及其在入侵容忍CA中的研究

    Application Research of the Intrusion Tolerance System Based on Biological Immune Theory;

    免疫原理在入侵容忍系统中的应用研究

    Research and Implementation of PKI Trust Model and Certificate Authority Based on Intrusion Tolerance;

    PKI信任模型及入侵容忍CA的研究与实现

    The Research of an Intrusion Tolerant System Based on Code Access Control;

    基于代码安全控制的入侵容忍系统的研究

    Research on the Model of Intrusion Tolerance System and the CA Scheme Based on Threshold;

    入侵容忍系统模型及基于门限的CA方案研究

    The Research of Database Security Based on Intrusion Tolerance Technique;

    基于入侵容忍技术的数据库安全的研究

    Research of Realization Approach for Intrusion Tolerant System Based on Combined Strategy;

    基于组合策略的入侵容忍系统实现方法研究

    Study and Implement on Intrusion Tolerant Techniques Based on Process Migration;

    基于进程迁移的入侵容忍技术的研究与实现