Layer 3 tunneling protocols can use similar methods; for example, IPSec defines public key certificate authentication in its ISAKMP/Oakley negotiation.
你也可以询问使用类似设置的同事是否可以连接到网络。
You can also ask a colleague who uses similar settings if he or she can connect to the network.
大韩民国使用类似的分析来评价连锁超市之间的合并。
(b) The Republic of Korea used similar analysis to evaluate a merger between supermarket chains.
使用类似的“善”话语参与道德话语和“坏”;
Engage discourses of morality using similar discourses of“good” and“bad”;
其他平台使用类似技术来跟踪威胁,但CNBC称他们通常无法访问实时位置和其他关键数据。
Other platforms use similar techniques to track threats, but CNBC reported that they typically do not have access to real-time location and other key data.
中文
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt