端加密 的英文怎麼說

中文拼音 [duānjiā]
端加密 英文
end-to-end encryption
  • : Ⅰ名詞1 (東西的頭) end; extremity 2 (事情的開頭) beginning 3 (門類; 方面) item; point 4 (原...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  1. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新的一次性口令認證機制。針對postgresql原有認證機制具有易遭受口令猜測攻擊和服務器假冒攻擊的缺陷,本文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何系統,就能有效強對各種攻擊手段的防範能力。
  2. Terminal services advanced client 5. 01 pack : rdp clients with high encryption 128 - bit

    服務高級客戶5 . 01軟體包:使用高位( 128位)的rdp客戶
  3. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    數據調制器完成對計算機輸出的控制信號處理,將指令碼載送到一指定頻率點。終收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到控制用戶通道的管理。
  4. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組碼rijndael演算法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael模塊,所得的結果再入到反饋,參與下一分組輸入的異或運算,迭代結束時的rijndael結果即為所求的hash函數值。
  5. Communication between the client and the web server is encrypted using a combination of the encryption keys sent by the client and keys provided by the web server

    客戶和web服務器之間的通信是通過組合使用客戶發送的鑰和web服務器提供的鑰來的。
  6. This paper used complex encrypting algorithm, and used the method of software encryption at the mobile terminal to certificate the security of data delivering, at the same time, by setting the rule of data delivering between the wap gateway and the server, it solved the problem efficiently

    摘要使用混合演算法,同時在移動終使用軟體方法來保證數據傳輸的安全性,並且在wap網關和服務器間設置數據傳輸規則,從而有效地解決了此問題。
  7. To help protect the data transferred between clients and servers from eavesdroppers, you should encrypt it by using digital certificate technology

    為了幫助保護客戶和服務器之間傳輸的數據免於被竊聽者竊取,您應該使用數字證書技術對數據進行
  8. Terrestrial trunked radio - security - synchronization mechanism for end - to - end encryption v1. 1. 1

    地面集群無線電.安全.端加密用同步化機制
  9. Parts easy to attack in the system are lan and communication link, which need to take link encrypting and point - to - point encrypting

    系統易受攻擊的環節是局域網與通信鏈路,需採取鏈路端加密措施。
  10. Terrestrial trunked radio - security - synchronization mechanism for end - to - end encryption endorsement of the english version en 302109 v1. 1. 1 2003 - 10 as german standard

    地面中繼無線電.安全.端加密的同步機制
  11. 9. some detail requirements, such as the maximum axial load ratio in columns, the minimum of confined transverse reinforcement within yield hinge regions and so on, are also proposed to modify chinese code ( gbj1o - 89 )

    本文還討論了現行《混凝土結構設計規范》 ( gbj10 ? 89 )關于軸壓比限值及柱端加密區約束箍筋最小要求等構造方面存在的問題,提出了相應的修正建議。
  12. But this method has the shortcoming of information leaking. based on mpls, this paper presents the thought and implem enting technology that encrypt the data by ipsec at the customer edge ( ce ) router and encapsulate the data at provider edge ( pe ) router. the problem of information leaking due to at mpls backbone has been resolved

    本文提出了基於多協議標記交換技術,利用ipsec在客戶路由器端加密,再在mpls邊緣路由器進行數據封裝的方法構建vpn ,解決了vpn採用mpls在公用骨幹網進行第二層傳輸存在的信息不能自動、容易因誤發或連接中斷造成信息泄漏等問題。
  13. Coinpe with talihonal analog tnulking system, tetra system is apter to boplemen digltal encrypon of speech and data, but system securiiy is unable to depertd sdriply on enctwon. from the point of view of the b1lbrmation system security arehithebe, the author classified and concltuled the tetra system seeurity and wuced sytw security bo the wts of thnd analysis, security requirements, security sehaces and security mangemen etc. 111e mechbosm of authentication, tem1ina enable and disabq air intn encrypion, end - bend encmption led in tewh is the key ler in this n to the security question of practical application, the re1evant wt w and m are provided too

    但是系統安全不能單純依靠來保證,作者從信息系統安全體系的角度,對tetra系統安全進行了分類歸納,從風險分析、安全需求、安全服務、安全管理等方面對tetra系統安全體系進行了閘述,並對tetra系統中主要應用的鑒權、終激活禁用、空中介面端加密等安個機制進行了重點研究,同時針對實際應用中出現的安全性問題提出了解決方法。
  14. W is a digiul trunkin mobile cominunhaon system based on mma forhnology it offers group call diw w m wion ( dmo ), duplex phone tall, padri data sehece, short data service and so on. tetw supports air interface and end - bend encrypon. tem is not only a fit private system for dispateh cominedcation of the polieq fire servce " w ha wtport, city tiwhc eto, but also for ule project reqthements of the public tw communication system

    Tetra是一種基於時分復用( tdma )技術的數字集群移動通信系統,它可以提供組呼調度、脫網直通( dmo ) 、企雙工電話、分組數據服務、數據簡訊息服務等業務,支持空中介面端加密功能,既適合公安、消防、機場、鐵路、城市交通管理等專業部門調度指揮專用,也可滿足社會共用集群網的設計要求。
  15. Based on the analysis of relatively mature network security technology that can be introduced by sip, by the means of improving and applications, the article realizes tls hop - by - hop encryption, s / mime end - to - end encryption mechanism, improved http digest authentication, s / mime end - to - end signature mechanism and so on

    在分析現今可以借鑒的用來對sip通信進行保護的相對比較成熟的網路安全技術的基礎上,通過改進和應用,實現了包括tls逐跳, s / mime端加密等的機制以及改進的http摘要認證, s / mime簽名等的身份鑒定機制。
  16. Considering regional characteristic and involved equipments, mpls vpn is a huge system actually. this paper focuses on its mechanism, implementing process of encrypting data at the customer edge ( ce ) router and encapsulating at provider edge ( pe ) router. some particulars are implemented with c + + builder 5. 0 : creating and sending of ip package, encrypting of ip packet, encapsulating of encrypted ip packet, sending encapsulated ip packet to mpls backbone

    不管是從其地域特性、還是從其所涉及到的設備來看, mplsvpn實際上是一個比較龐大的系統,本文主要側重於討論其系統結構以及數據在客戶路由器端加密和在服務提供商邊緣路由器封裝的實現過程,並用c + + builder5 . 0實現了其中的幾個細節: ip數據包的產生與發送, ip數據包的后ip數據包的封裝,封裝后數據包發送至mpls骨幹網。
  17. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統機制的研究,首先介紹了數字集群通信系統的安全保機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面過程及其鑰的選用和管理,特別介紹了端加密;然後介紹了幾種常用的演算法,通過分析其優劣,提出了端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統方案的設計,其具體過程為將經過數字信號送入器里,和以idea演算法為基礎設計的碼流發生器( ksg )產生的碼序列進行運算,並且研究了此過程的碼同步問題。
  18. Further analyses are given to some important parts of the secure email system, such as digital signature, encryption and decryption. the author also describes in detail how to realize them. in the third part, it is proposed to use ldap server for distribution of the certificates and use sasl authentication in secure email system to ensure information security

    對適于安全電子郵件的演算法從hash 、簽名到、認證進行了比較分析;二是根據s mime協議提出了安全郵件系統的體系結構,對其重要的數字簽名、和解部分作進一步的分析,給出了具體實現步驟並進行了實現;三是基於ldap協議設計了用戶證書和通信簿管理體系,建立了ldap服務器客戶數字認證模型,並進行了實現。
  19. It discusses about the safe serial communication about long nc programs between the embedded terminal and the cnc machine tool, which is realized by adopting the way of dnc communication. after analyzing characteristics about some kinds of data encryption algorithm, the rijndael encryption is selected to realize cooperative product data ’ s storage in the server and transmission in internet on encryption manner

    在分析各種數據演算法的特點后,選用了rijndael演算法,實現了外協產品數據在服務器上存儲、在網路上傳輸和在終上被解,並在終與數控機床之間以dnc通訊方式實現長nc程序安全傳輸。
  20. A pki and smart cards - based security scheme is presental for documents transmission, in this scheme, the client - and server do the authentication each other firstly, encrypte data transmission channel and then transfer secure documents, which significantly improved the ftp security

    該方案在文件傳輸時先進行客戶和服務器雙向身份認證,然後建立數據傳輸通道,在通道上安全地傳輸文件,這樣很大程度上提高了ftp的安全性。
分享友人