實用密碼技術 的英文怎麼說

中文拼音 [shíyòngshù]
實用密碼技術 英文
applied cryptography
  • : Ⅰ形容詞1 (內部完全填滿 沒有空隙) solid 2 (真實; 實在) true; real; honest Ⅱ名詞1 (實際; 事實...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : 名詞(技能; 本領) skill; ability; trick; technique
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真性、數據電訊的機性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加以及各國立法對的進出口及使的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. The system took the wireless lan, bar - code and remotion calculating, and winsock technologies to build server and client programs to realize data transfer between three subsystems, also took these three subsystems closely combine to work availably and rapidly

    系統採了條、移動計算和winsock,分別建立了服務端和客戶端程序,現了各個子系統之間的數據傳遞,並將這三大子系統緊地結合起來進行有效而快捷的工作。
  3. Stamper and signature is very important in the affair of tradition work in government and enterprise. this article according to the characteristic of traditional signature and stamper, combinic the demands of signature and seal in e - government - affair work information system, inosculates the technology of middleware and e - government - affair security, makes use of object oriented and component technology, integrates correlation knowledge of compositive cryptogram, pki, seal digital image, activex etc, studies and achieves digital e - signature - seal middleware based on web which is used in internet / intranet environment

    印章和簽名在傳統的政府辦公和企業事務處理中起著十分重要的作。本文根據傳統簽名、蓋章的特點,結合電子政務辦公信息系統中的蓋章簽名需求,把電子政務安全和中間件相融合,利面向對象和組件,集成學、 pki 、印章數字圖像、 activex控制項等相關知識,研究並現了一個應於internet intranet環境中的基於web的電子簽章中間件。
  4. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電子郵件服務系統中存在的安全隱患,基於對目前國內外電子郵件安全的分析研究,立足於現有軍事計算機網路的際現狀,根據目前軍隊的辦公模式、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、管理的應需求等進行了詳細的分析和設計。
  5. This dissertation implements an access vpn cryptographical system and illustrates an application example. futhermore, there are more research work need to be done, include incorporating with ipsec protocol and firewall technology

    本文在對各項討論和改進的基礎上,採kerberos協議、 socks協議和國內專演算法,現了一個遠程訪問vpn系統,並給出了該系統的際應
  6. In a word, by integrating the user " s fingerprint identification with the cryptological authentication protocol, a secure, reliable and effective approach to identifying the users in the network environment can be provided

    把以指紋特徵為代表的生物識別與基於體制的身份認證協議有機結合,向最終戶提供一種更加安全、可靠、便捷的身份認證手段,將是成功地現網路安全和信息系統安全的有效途徑。
  7. We discuss the theory and technology of coding and cryptology in the study of information security and information reliability in the disseration. some valuable theoretic results are presented, most of these results are published on the important journey of china, parts of these results are used in some application system. in the design and analysis of error - correcting codes, we obtain the following results

    本文探討了信息安全和信息可靠性研究中的編理論與,在糾錯的設計與分析、序列的設計與分析以及分組的設計與分析等方面,得到了一些有價值的理論結果,大多數結果已在國內核心刊物上發表,有些結果已際的應系統。
  8. Thus many isolated networks are formed in tv station, and this brings much inconvenience. web services is a new distributed computing technology, it combines the tight - coupling n - tier computing technology and the concept of loose - coupling web together, thus allows the clients access the distant web services via standard network transfer protocol ( http ). the messages of request and response are all encoded in xml format

    Web服務( webservices )是近年來剛剛出現的一種分散式計算,它將緊耦合的n層計算與鬆散耦合的web概念相結合,允許客戶端通過標準網路傳輸協議http調遠程的web服務,調請求和返回結果都xml進行編,從而現了平臺無關性。
  9. Work done by author is introduced in this thesis. this work includes research on quantum cryptography theories, quantum key distribution and quantum digital signature together with application of quantum cryptography

    本文介紹了作者在量子學領域里的工作,這些工作主要包括對量子理論、量子鑰分配和量子數字簽名的研究,以及量子際應
  10. Optical code division multiple access ( ocdma ) technology possess the characteristics of combating interference, high frequency efficiency, security, and simply network protocol, random access, so it is competitive to apply ocdma to wireless optical access network

    分多址( ocdma )具有的抗干擾能力強、頻率利率高、保性好、網路協議簡單、支持隨機接入等優點,將其應到無線光接入網中,不僅具有cdma的優點又保持了無線光通信的優點,現二者優勢互補。
  11. Besides, phpminiadmin also realizes the statistic of session, the record of user operation and the encryption of user password during transfer and in database, etc

    另外, phpminiadmin還在對象的基礎上現了會話統計、戶操作記錄以及運傳輸和保存等功能。
  12. The software applies the technology of dynamic multiple documents. it includes password module, initialization module, waves of torque and rotate speed display module, data and report forms module and help module

    動態多文檔,整個系統包括以下幾個部分:模塊、轉速和扭矩的初始化模塊、轉速和扭矩時波形顯示模塊、數據與報表模塊以及幫助模塊等。
  13. On the base of researching in several application security systems, this paper did much work on researching in symmetrical cryptographic system, public key cryptographic system, digital signature system and the digital certificate application technology in the contemporary cryptography, and issued a suitable security application framework taking account of the characteristics of the rfmdms, several key technologies in constructing were discussed also

    本文在對國內外各種安全應系統調查研究的基礎上,圍繞現代學中對稱式系統、公開系統、數字簽名系統、數字證書應等進行了深入研究,並結合rfmdms體系結構方面的特點,提出了適合rfmdms的安全應系統框架,而且對系統現中的關鍵進行了研究。
  14. It has been playing an important role in equipping all kinds of arms and services for campaigns, tactical exercises and emergent actions etc. based on the detailed analysis of the exchange ' s architecture and implementing, this thesis points out some disadvantages of the device, such as too many absolute components, not very high enough reliability and security, very large size and weight, operating and maintaining difficultly. considering low power requirement and man - machine interface optimizing design at the same time, the thesis come up with an integrated design scheme to the previous device based on " mcu + cpld / fpga architecture " : ( 1 ) signal frequency dividing, timing frequency producing, 20 customers " led states controlling are implemented in cpld ; ( 2 ) decoding, latching data and controlling signals are implemented in cpld by bus interface between mcu and cpld ; ( 3 ) chip selecting principles and mcu idle mode design are completed under the consideration of low power requirement ; ( 4 ) operation by chinese lcd menus is adopted in the man - machine interface

    本項目以該交換機為研究對象,在詳細分析原設備的系統結構和功能現方式的基礎上,指出該機型在使過程中存在相對陳舊、分立元件過多、可靠性和保性不夠、體積大、重量大、維修困難等問題,同時結合系統的低功耗需求和優化人機介面設計,本文提出基於「單片機+ cpld fpga體系結構」的集成化設計方案:在cpld中現信號音分頻和計時頻率生成電路、 20路戶led狀態控制電路; cpld與單片機以總線介面方式現譯、數據和控制信號鎖存功能的vhdl設計;基於低功耗設計的器件選型方案和單片機待機模式設計;人機介面的lcd菜單操作方式。
  15. Finally, considering the problem which the cipher ' s secure level is not easy to be changed in the existing elliptic curve digital signature field - arithmetic algorithms, we express a large number as the structure data type and design a field - arithmetic algorithm in elliptic curve cryptography for different cipher security

    第四是針對現廣西大學碩士學位論文一基於橢圓曲線體制的多重數字簽名研究有的橢圓曲線體制域算算潔在現上強度不易擴展的問題,我們將大整數結構數據類型表示,設計適合不同橢圓曲線強度的域算算潔。
  16. Information technology - security techniques - entity authentication - part 4 : mechanisms using a cryptographic check function

    信息安全體鑒別第4部分:採校驗函數的機制
  17. To overcome the shortcoming of the double - way authentication access control scheme based on harn ' s digital signature, a new double - way authentication protocol is proposed to improve the old one. a new single - key - lock - pair access control scheme is proposed as a improved access control scheme, based on the property that a integer can be denoted into only one binary digital

    針對基於harn數字簽名雙向認證訪問控制現方案中所存在的問題,運改進了原方案的雙向認證協議,並作為對原訪問控制方案的改進,基於整數二進製表示的唯一性,提出了一種新的單鑰-鎖對訪問控制方案。
  18. In this model, a local voice server is used to compound voice, broadcast voice, receive dual tone multi frequency ( dtmf ) code and perform concurrent working ; in the meantime, some mature internet technologies such as routing, virtual private network ( vpn ) along with thread technology are also used to carry out valid, reliable access to remote database

    在這個模型中,本地的語音服務器進行語音的合成與播放、接收雙音多頻現并行工作,同時利internet中成熟的路由及安全加對異地數據庫進行有效和可靠的訪問,以獲得語音服務所需要的數據。
  19. The model is applied in ca / ra, it creates and manage storage and issues of pki key data. pki system is a common, safe and foundational institute. unsymmetrical code arithmetic principle and technology is applied into pki system and provided safety service

    Pki系統是一個非對稱演算法原理和現並提供安全服務的具有通性的安全基礎設施,它通過使公開和數字證書來確保系統信息安全並負責驗證數字證書持有者身份的一種體系。
  20. With the development of the internet, the security of computer security is playing an important role. one means of providing security in communications is though encryption

    隨著計算機聯網的逐步普及,計算機信息的保問題顯得越來越重要。數據保變換,或,是對計算機信息進行保護的最和最可靠的方法。
分享友人