• E-Commerce security protocol usually adopts SSL and SET protocol.

    电子商务中的安全协议主要采用SSL协议SET协议。

    youdao

  • The most common e-commerce security of SSL and SET mechanism is two.

    电子商务常见之平安机制sslSET两种

    youdao

  • E-Commerce security protocols based on XML are discussed in the paper.

    本文主要对基于XML电子商务安全协议进行了研究。

    youdao

  • This simple activity illustrates the four major players in e-Commerce security.

    这个最简单活动说明e - Commerce安全最主要4个参与者

    youdao

  • What can China learn from other countries when it comes to enhancing e-commerce security?

    有什么可以借鉴其他国家中国谈到加强电子商务安全性

    youdao

  • The paper discusses and analyses Cryptography technology and its application in e-commerce security.

    论述分析了加密技术及其电子商务安全方面应用现状

    youdao

  • At last, according to the content, the article analysis and designs a set of realization scheme for E-commerce security system.

    最后,笔者根据这些内容分析设计电子商务安全系统实现方案

    youdao

  • The main thesis completed the following work: 1. Fingerprint technology and e-commerce security certification of the theoretical analysis.

    本论文主要完成以下工作:(1)指纹技术电子商务安全认证理论分析。

    youdao

  • E-commerce security protocol is not only an important way to protect the security of e-commerce, but also the core technology of thee-commerce.

    电子商务安全协议保障电子商务安全性重要途径也是电子商务核心最关键的技术

    youdao

  • The importance of e-commerce security protocol is self-evident as a key factor to ensure the information and data security, and to safeguard the vital interests of both sides.

    电子商务安全协议作为切实保证交易双方信息数据安全,维护双方切身利益的关键因素,其重要性不言而喻

    youdao

  • It has been proven by instances that the extended model and method can better analyze and describe the security of e-commerce security protocol, and be applied in wider fields.

    实例证明扩展后模型方法能够精确地分析描述电子商务安全协议安全性能够应用更广泛的领域。

    youdao

  • In this paper, the authors present a new SAML-based security information exchange service and a cooperative e-Commerce security service system for enterprise application integration.

    针对问题,给出了一种基于SAML安全数据交换服务基于该服务的面向企业应用协作的协同电子商务安全服务系统

    youdao

  • For example, any part of your application that deals with e-commerce, banking, or finances requires the heaviest data security and encryption you can get your hands on.

    例如处理电子商务银行交易金融任何应用程序部分都需要所能提供最高级别的安全性加密

    youdao

  • In this article, we focus on possible attack scenarios in an e-Commerce system and provide preventive strategies, including security features, that you can implement.

    本文中,我们关注e - Commerce系统可能出现袭击场景以及可以实施的预防策略包括安全特性

    youdao

  • This article outlined the key players and security attacks and defenses in an e-Commerce system.

    本文概述e - Commerce系统中的关键参与者安全性攻击防御

    youdao

  • This paper introduces the basic concepts of SET, the primary technologies involved and the running procedure, at the same time it analyses how SET implement the security of e - commerce.

    这里详细介绍SET基本概念、所使用的主要技术以及运行过程同时分析了SET是怎样解决网上交易安全性的。

    youdao

  • P2P Electronic Commerce greatly enhances the conveniency and flexibility of e-business, on the other hand that aggravates the risk and security threatening of business activity.

    P2P电子商务比传统电子商务方便、更灵活,但用户所涉及风险安全威胁越大,各种网络诈骗层出不穷。

    youdao

  • Furthermore, e-commerce using check and credit cards leaves the clients vulnerable to banking fraud which remains the top security concerns for people when it comes to online shopping.

    此外电子商务所需用信用卡容易客户实施银行诈骗意味着,人们网购时,人们的安全受到威胁。

    youdao

  • As a new business model, information security, security is a prerequisite for the implementation of e-commerce.

    而作为一种全新商务模式信息安全保障电子商务实施前提

    youdao

  • The security is the primary concern to the network system of E commerce.

    安全性电子商务网络系统首要问题

    youdao

  • This paper describes the mathematics base of algebraic geometry and ECC. It also discusses the elliptic curve discrete logarithm problem (ECDLP) and the security applications of ECC on E-commerce.

    该文描述了代数几何ecc数学基础椭圆曲线离散对数问题困难性讨论了ECC电子商务中的安全应用

    youdao

  • From data of accountant to information system of accountant, the paper builds the security control system of corporation accountant in the circumstance of E-commerce.

    本文点(会计数据)面(会计信息系统)构建电子商务环境下企业会计安全控制体系

    youdao

  • We analyse the security of e-commerce protocols in failure environments using the model checking approach.

    本文模型检测方法分析不可靠环境下电子商务协议安全性质。

    youdao

  • Therefore it is necessary to understand the network threats toe-commerce, and adopt the corresponding security policy to guarantee e-commerce run normally continuously, stably and correctly.

    因此必须了解电子商务所受到网络威胁采取相应安全策略保证电子商务系统的正常连续稳定正确地运行

    youdao

  • In the light of the economic security and risks existing in e-commerce, the industrial safety checklist can be used in thee-commerce for estimating the security of e-commerce platform.

    针对电子商务存在经济安全和风险工业安全检查表法应用电子商务评价电子商务平台安全性

    youdao

  • Under this tide, traditional security ways have been no longer reliable to satisfy the need of complex behaviors of e-commerce and information security.

    潮流之下,传统保密与认证方式难以应付日益复杂电子交易信息保密措施需要

    youdao

  • Under this tide, traditional security ways have been no longer reliable to satisfy the need of complex behaviors of e-commerce and information security.

    潮流之下,传统保密与认证方式难以应付日益复杂电子交易信息保密措施需要

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定