tamper-resistant
tamper-resistant是什么意思、tamper-resistant怎么读
tamper-resistant 基本解释
网络 防篡改; 防破坏; 篡改; 防窜改; 抗干扰
重点词汇
tamper-resistant 双语例句
- 1、
All this information needs to be stored in a secure and tamper-resistant manner with the capability to report on it for audit purposes.
所有这些信息都需要按照可靠且不可篡改的方式存储起来,支持根据这些数据生成审计报告。 - 2、
The firewall is tamper-resistant because it is independent of the host's operating system.
因为防火墙独立于主机的操作系统,所以它是防篡改的。 - 3、
The present invention provides a flexible, tamper-resistant authentication system, or personal authentication device ( PAD), which can support applications in authentication, authorization and accounting.
本发明系关于一兼具弹性及反窜改特性之个人身份确认装置,其可支援身份确认、权、稽核等应用。 - 4、
Web Page tamper-resistant Mechanism Based on File-filtering Driver and Event-triggering
基于文件过滤驱动和事件触发的网页防篡改机制 - 5、
The system works with the79 contactless RFID electronic lock, which offers multiple locking options and is tamper-resistant.
系统可对79个免接触RFID电子锁起到控制作用,从而支持多种所选项也能防止被篡改。 - 6、
Website tamper-resistant mechanism based on E-Key and Web page monitor
一种基于E-Key及Web页面监控的网站防篡改机制研究 - 7、
This way is based on how to prevent the attacks to extract the secret information from smart card, tamper-resistant and/ or from symmetric key algorithms implemented in these Integrated Receiver Devices ( IRD).
这个问题关键在于如何防止从对称密钥算法中解析加密信息的攻击,而这些对称密钥算法通常在智能卡、存储器或集成接收设备(IntegratedReceiverDevices,IRD)七实现。 - 8、
This architecture improved system performance greatly. At the same time being different from the existing Web page tamper-resistant products, the system put the backup server and publishing server in parallel configuration making backup server hidden in t
同时区别于已有的网页防篡改产品,本系统将备份服务器与发布服务器并行配置,进一步提高了系统安全性能。 - 9、
Today, with the popularity of software applications, tamper-resistant requirements have become increasingly important.
而如今,随着软件应用的迅速普及,软硬件防篡改的要求越加重要。 - 10、
The simulation results show that: The above algorithm should be a good tamper-resistant capability, and can navigate to the text lines, or block of characters.
试验表明:上述算法都要很好防篡改能力,并能定位到文本行,或者字符块。 - 11、
Lastly, in consideration of the shortcomings that the verifiable secret sharing schemes protect public parameters from being falsified, a novel verifiable dynamic secret sharing scheme with tamper-resistant public parameters is proposed.
最后,针对可验证动态秘密共享方案在防范公开参数篡改方面的不足,提出了一种可防公开参数被篡改的可验证动态秘密共享方案,该方案中,公开参数均能被参与者所验证。 - 12、
Trusted computing is one of the hottest issues in information security field, providing security solution based on a small tamper-resistant hardware TPM.
可信计算是目前信息安全领域研究的热点问题之一,通过嵌入主板的小型防篡改硬件TPM,提供安全解决方案。

