isopotal line

基本解释等侵入容量线

网络释义

1)isopotal line,等侵入容量线2)iso-capacity curve,等容量曲线3)intrusion tolerance,入侵容忍4)intrusion tolerance,容忍入侵5)intrusion tolerant,入侵容忍6)intrusion-tolerant,入侵容忍

用法和例句

Design of voting algorithms and synchronous scheme of intrusion tolerance database;

入侵容忍数据库的选举算法和同步方案设计

Solution of security database based on multi-layer intrusion tolerance;

基于多级入侵容忍的数据库安全解决方案

Digital Signature Based on Elliptic Curve Cryptography and Its Application in Intrusion Tolerance CA;

基于ECC的数字签名及其在入侵容忍CA中的研究

Secure intrusion tolerance scheme based on proactive secret sharing;

基于主动秘密共享的安全容忍入侵方案

Research of intrusion tolerance middleware model based on interceptor;

基于拦截器的容忍入侵中间件模型研究

Design of intrusion tolerance application server based on voting algorithm;

基于大数表决机制的容忍入侵应用服务器设计

An intrusion tolerant KDC scheme for multicast communication;

一种入侵容忍的广播通讯KDC方案

Research of Realization Approach for Intrusion Tolerant System Based on Combined Strategy;

基于组合策略的入侵容忍系统实现方法研究

In this paper an intrusion tolerant CA system was presented.

提出了一个入侵容忍CA(Certificate Authority,认证中心)系统,在此系统中构造了一个基于椭圆曲线密码体制的(t,n)门限签密方案,该方案是数字签名和公钥加密的有机集成,不仅减少了系统的开销,并使得系统能探测故障服务器和克服签密合成者的欺骗。

Authentication System with Intrusion-tolerant Feature;

具有入侵容忍特性的身份认证系统

Threshold Password-enabled Based on Distribute Intrusion-Tolerant Protect Private Key;

基于门限加密技术的全分布入侵容忍私钥保护

The Research and Implementation on Threshold Password-Enabled Based of Intrusion-Tolerant Protect Private Key;

基于门限加密技术的入侵容忍私钥保护应用研究

Research and Implementation of the Intrusion Detector for Intrusion Tolerant Databases;

入侵容忍数据库入侵检测器的研究与实现

Security Analysis of Intrusition Tolerance System Based on Petri Nets;

基于Petri网的入侵容忍系统的性能评价

Research and Design of Web Server Intrusion-Tolerant System;

Web服务器入侵容忍系统的研究和设计

Research on the Theory and Applied Technology of Network Intrusion Tolerance

网络入侵容忍的理论及应用技术研究

Intrusion-tolerant key distribution scheme based on RSA

基于RSA的入侵容忍密钥分发方案

A Survey of Security Quantitative Analysis for Intrusion Tolerant System

入侵容忍系统的安全性量化方法分析

Architecture for Database Security Based of Intrusion-tolerance

基于入侵容忍的数据库安全体系结构

Model Design of Intrusion Tolerant System Based on Byzantine Protocol

基于拜占庭协议的入侵容忍系统模型设计

Threshold Password-enabled Based on Distribute Intrusion-Tolerant Protect Private Key

基于门限加密技术的全分布入侵容忍私钥保护

Algorithms of Sequence Analysis and Theirs Applications in Intrusion Tolerance;

序列分析算法及其在入侵容忍中的应用研究

Digital Signature Based on Elliptic Curve Cryptography and Its Application in Intrusion Tolerance CA;

基于ECC的数字签名及其在入侵容忍CA中的研究

Application Research of the Intrusion Tolerance System Based on Biological Immune Theory;

免疫原理在入侵容忍系统中的应用研究

Research and Implementation of PKI Trust Model and Certificate Authority Based on Intrusion Tolerance;

PKI信任模型及入侵容忍CA的研究与实现

The Research of an Intrusion Tolerant System Based on Code Access Control;

基于代码安全控制的入侵容忍系统的研究

Research on the Model of Intrusion Tolerance System and the CA Scheme Based on Threshold;

入侵容忍系统模型及基于门限的CA方案研究

The Research of Database Security Based on Intrusion Tolerance Technique;

基于入侵容忍技术的数据库安全的研究

Research of Realization Approach for Intrusion Tolerant System Based on Combined Strategy;

基于组合策略的入侵容忍系统实现方法研究

Study and Implement on Intrusion Tolerant Techniques Based on Process Migration;

基于进程迁移的入侵容忍技术的研究与实现

最新行业英语

行业英语