• The paper analyzes security of UCON model and puts forward the TUCON model based on Trusted Computing Module(TPM).

    主要对UCON模型安全性进行了分析可信计算模块TPM引入UCON模型,构建了基于TPM的使用控制模型——TUCON模型。

    youdao

  • The trusted computing based on the hardware security module supporting is the platform to enhance the whole security broadly used in the computation and the communications system.

    可信计算计算通信系统广泛使用基于硬件安全模块支持下的可信计算平台提高整体安全性

    youdao

  • Trusted computing enhances computer systems'security by adding some module on both software and hardware.

    可信计算通过软件硬件增加一些组件增加计算机系统的可信赖性。

    youdao

  • With the development of information technology, the advantage of trusted computer in security is much accounted of The Trusted platform module is the core of Trusted Computing PC.

    随着信息技术飞速发展可信计算机安全方面优越性越来越受到国内外计算机领域工作者的重视。

    youdao

  • TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.

    基于TPM安全优盘系统使用可信计算平台模块TPM实现密钥存储管理解决密码技术中密钥管理的难题

    youdao

  • TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.

    基于TPM安全优盘系统使用可信计算平台模块TPM实现密钥存储管理解决密码技术中密钥管理的难题

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定