端到端加密 的英文怎麼說

中文拼音 [duāndàoduānjiā]
端到端加密 英文
end-to-end encryption
  • : Ⅰ名詞1 (東西的頭) end; extremity 2 (事情的開頭) beginning 3 (門類; 方面) item; point 4 (原...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 端到端 : e-e end-to-end
  1. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    數據調制器完成對計算機輸出的控制信號處理,將指令碼載送一指定頻率點。終收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達控制用戶通道的管理。
  2. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組碼rijndael演算法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael模塊,所得的結果再反饋,參與下一分組輸入的異或運算,迭代結束時的rijndael結果即為所求的hash函數值。
  3. This thesis regard internal property reorganization in the group of pangang as the research object, from chengdu seamless steel pipe limited liability company with chengdu iron and steel works inside exterior environment reorganizing in front and back commences, making use of to exceed the makel - bot with of five factors competition models and the method of factors analysis, after analyzing the reorganization of the business enterprise a profession for facing competes the situation. develop the development the business enterprise with the profession industry from the international local profession rival circumstance after analyzing the reorganization should the market position of the establishment with develop the strategy target. make use of the swot the analysis the method, to after the reorganization the development strategy of the business enterprise, from manage the angle proceeded the fixed position analyzes, for after the reorganization business enterprise development provided four kinds of developments strategy that eligibility choose : the brave development strategy, request the resources advantage, funds advantage, human resource advantage, technique advantage that new company make the most of new business enterprise in empress in reorganization, is an essential condition to increases to manage the level, quickly technique reforms, develop the high and additional worth product with new product production line, as soon as quikly change to strong and large business enterprise, realizes soon steel aircraft carrier dream ; dispersion strategy, the technology market quota with deal with produce high additional worth product, completely promote business enterprise brand image, extend high carry product of the exaltation product, is a necessary means to increases business enterprise performance, realizes business enterprise target ; defense strategy, adjusting the business enterprise organizes construction, reducing the intensive type in labor and the low additional worth product line, lower bad the property saves the deal, alleviating the business enterprise burden, attaining the casual wear go to battle, benefitting to the challenge that make frontal attack the rival ; withdraw strategy, compress the production of the high depletion and high cost product, simplify the production craft, controlling the cost of the end product in the lower level, is a valid path to increases business enterprise competition ability

    本論文以攀鋼集團內部的資產重組為研究對象,從成都無縫鋼管有限責任公司與成都鋼鐵廠重組前後的內外部環境入手,運用邁克爾?波特的五力競爭模型及因素分析法,分析了重組后的企業所面臨的行業競爭態勢。從國際國內行業競爭對手情況和本行業發展動態分析了重組后企業應確立的市場地位和發展戰略目標。運用swot分析法,對重組后企業的發展戰略,從管理角度進行了定位分析,為重組后企業發展提供了可選擇的四種發展戰略:即大膽發展戰略,要求新公司充分運用重組后新企業的資源優勢,資金優勢,人力資源優勢,技術優勢,是提高管理水平,快技術改造,開發高附值產品和新產品生產線,盡快立於強勢企業之林,早日實現「鋼鐵航母」夢的必要條件;分散性戰略,提高產品的科技含量和生產高附值的產品,全面提升企業品牌形象,擴大高產品的市場份額,是提高企業效益,實現企業目標的必要手段;防禦性戰略,調整企業組織結構,削減勞動集型和低附值產品生產線,降低不良資產存量,減輕企業包袱,做輕裝上陣,有利於迎擊競爭對手的挑戰;退出性戰略,壓縮高消耗、高成本產品的生產,降低低產品的比例,精簡生產工藝,將最終產品的成本控制在較低水平,是提高企業競爭力的有效途徑。
  4. Parts easy to attack in the system are lan and communication link, which need to take link encrypting and point - to - point encrypting

    系統易受攻擊的環節是局域網與通信鏈路,需採取鏈路端到端加密措施。
  5. Terrestrial trunked radio - security - synchronization mechanism for end - to - end encryption endorsement of the english version en 302109 v1. 1. 1 2003 - 10 as german standard

    地面中繼無線電.安全.端到端加密的同步機制
  6. Coinpe with talihonal analog tnulking system, tetra system is apter to boplemen digltal encrypon of speech and data, but system securiiy is unable to depertd sdriply on enctwon. from the point of view of the b1lbrmation system security arehithebe, the author classified and concltuled the tetra system seeurity and wuced sytw security bo the wts of thnd analysis, security requirements, security sehaces and security mangemen etc. 111e mechbosm of authentication, tem1ina enable and disabq air intn encrypion, end - bend encmption led in tewh is the key ler in this n to the security question of practical application, the re1evant wt w and m are provided too

    但是系統安全不能單純依靠來保證,作者從信息系統安全體系的角度,對tetra系統安全進行了分類歸納,從風險分析、安全需求、安全服務、安全管理等方面對tetra系統安全體系進行了閘述,並對tetra系統中主要應用的鑒權、終激活禁用、空中介面端到端加密等安個機制進行了重點研究,同時針對實際應用中出現的安全性問題提出了解決方法。
  7. W is a digiul trunkin mobile cominunhaon system based on mma forhnology it offers group call diw w m wion ( dmo ), duplex phone tall, padri data sehece, short data service and so on. tetw supports air interface and end - bend encrypon. tem is not only a fit private system for dispateh cominedcation of the polieq fire servce " w ha wtport, city tiwhc eto, but also for ule project reqthements of the public tw communication system

    Tetra是一種基於時分復用( tdma )技術的數字集群移動通信系統,它可以提供組呼調度、脫網直通( dmo ) 、企雙工電話、分組數據服務、數據簡訊息服務等業務,支持空中介面端到端加密功能,既適合公安、消防、機場、鐵路、城市交通管理等專業部門調度指揮專用,也可滿足社會共用集群網的設計要求。
  8. Based on the analysis of relatively mature network security technology that can be introduced by sip, by the means of improving and applications, the article realizes tls hop - by - hop encryption, s / mime end - to - end encryption mechanism, improved http digest authentication, s / mime end - to - end signature mechanism and so on

    在分析現今可以借鑒的用來對sip通信進行保護的相對比較成熟的網路安全技術的基礎上,通過改進和應用,實現了包括tls逐跳, s / mime端到端加密等的機制以及改進的http摘要認證, s / mime簽名等的身份鑒定機制。
  9. Considering regional characteristic and involved equipments, mpls vpn is a huge system actually. this paper focuses on its mechanism, implementing process of encrypting data at the customer edge ( ce ) router and encapsulating at provider edge ( pe ) router. some particulars are implemented with c + + builder 5. 0 : creating and sending of ip package, encrypting of ip packet, encapsulating of encrypted ip packet, sending encapsulated ip packet to mpls backbone

    不管是從其地域特性、還是從其所涉及的設備來看, mplsvpn實際上是一個比較龐大的系統,本文主要側重於討論其系統結構以及數據在客戶路由器和在服務提供商邊緣路由器封裝的實現過程,並用c + + builder5 . 0實現了其中的幾個細節: ip數據包的產生與發送, ip數據包的后ip數據包的封裝,封裝后數據包發送至mpls骨幹網。
  10. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統機制的研究,首先介紹了數字集群通信系統的安全保機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面過程及其鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的演算法,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統方案的設計,其具體過程為將經過數字信號送入器里,和以idea演算法為基礎設計的碼流發生器( ksg )產生的碼序列進行運算,並且研究了此過程的碼同步問題。
  11. Further analyses are given to some important parts of the secure email system, such as digital signature, encryption and decryption. the author also describes in detail how to realize them. in the third part, it is proposed to use ldap server for distribution of the certificates and use sasl authentication in secure email system to ensure information security

    對適于安全電子郵件的演算法從hash 、簽名、認證進行了比較分析;二是根據s mime協議提出了安全郵件系統的體系結構,對其重要的數字簽名、和解部分作進一步的分析,給出了具體實現步驟並進行了實現;三是基於ldap協議設計了用戶證書和通信簿管理體系,建立了ldap服務器客戶數字認證模型,並進行了實現。
  12. This expression vector plbcas - hsa - lgl has the following advantages : i ) the 1. 7kb promoter is able to drive cell - specific and hormone - dependent expression ; ii ) the inclusion of intron - 1 can increase expression level of fusion genes ; iii ) the 5 ' utr of bovine p - casein mrna may have a positive role in both transcriptional and post - transcriptional regulation ; iv ) the gfp gene make the selection of positive clone among embryos possible ; v ) the gfp gene can be easily excised via cre - mediated recombination between the two loxp sites after the expression vector has been integrated into chromosome ; vi ) the two incompatible lox sites, loxp and lox2272, would facilitate cre - recombinase mediated cassette exchange ( rmce ), which in theory will leading to develop a technology of site - specific gene expression in animal mammary glands

    該載體的特點是:具有可以調控外源基因在乳腺中特異表達的牛-酪蛋白基因5 `側翼區和包括第一外顯子及內含子在內的5 `調控區;將人血清白蛋白cdna準確地置於牛-酪蛋白基因第二外顯子中的翻譯起始碼子atg之後,而且沒有增額外的序列和使人血清白蛋白cdna移碼;引入標記基因gfp ,便於在胚胎期鑒定陽性胚胎,減少受體;引入cre lox重組系統: ( ? )標記基因gfp的兩的兩個loxp位點可以在表達載體整合基因組后,刪除標記基因; ( ? )餘下的一個loxp位點可以和前面的lox2272位點組成cre重組酶介導的盒式交換系統。
  13. The last part of setting up the keystore is to add your certificate or your cas certificate to the queue managers key repository, so that when the client sends its certificate, the queue manager can validate it

    設置keystore的最後工作是將您的證書或ca證書添queue manager鑰儲存庫中,這樣當客戶發送其證書時, queue manager就能夠驗證該證書。
  14. Jpeg2000 based on wavelet transform is a new image compress standard of many excellent characters. iamge compress algorithmic can run more efficiently on dsp. the success of techinique research, including entire digital camera product and the key technique, and the industrialization of digital camera industry can give our own knowledge property right in digital camera technique, and then enhance the function of digital camera, upgrade its ability to compete

    國內數碼相機相關技術的研發起步較晚,其主要原因是數碼相機涉及眾多尖的傳感器技術、微電子技術、精光學技術、微機械控制技術、數字信號處理器技術和電腦多媒體技術,而且跟這些技術相關聯的光學、集成電路、微機械控制的工工藝更是國內的薄弱環節,從而制約了國內數碼相機產業的形成和發展。
  15. Dialog security provides end - to - end encryption and remote authorization for conversations to specific services

    對話安全模式為特定服務的會話提供和遠程授權。
  16. Service broker dialog security provides end - to - end encryption and authorization for conversations between specific services

    Service broker對話安全模式為特定服務間的會話提供和授權。
  17. Notice, however, that transport security does not provide end - to - end encryption, and does not provide authentication for individual conversations

    但請注意,傳輸安全模式不提供,而且也不為單個會話提供身份驗證。
分享友人