| 1. | Method starts transport layer security encryption 方法启动传输层安全加密。 |
| 2. | Method ends transport layer security encryption 方法结束传输层安全加密。 |
| 3. | Information technology - lower layers security model 信息技术低层安全模型 |
| 4. | No transport layer security is used 未使用任何传输层安全协议。 |
| 5. | Research of cross - layer security architecture in wireless mesh networks 无线网格网的跨层安全架构研究 |
| 6. | Research of four - layer security database architecture based on b s mode 结构的数据库四层安全体系结构研究 |
| 7. | Ss7 . telecommunications - signalling system number 7 - upper layer security capability 电信. 7号信令系统 |
| 8. | Developing the third market and establishing the multi - layered security market 发展三板市场构建多层次证券市场 |
| 9. | Information technology - open systems interconnection - upper layers security model 信息技术开放系统互连高层安全模型 |
| 10. | Though this is redundant , layering security is a positive thing 虽然这显得有些多余,但对于安全仍然是一个积极的做法。 |