端對端加密 的英文怎麼說

中文拼音 [duānduìduānjiā]
端對端加密 英文
end-to-end encryption
  • : Ⅰ名詞1 (東西的頭) end; extremity 2 (事情的開頭) beginning 3 (門類; 方面) item; point 4 (原...
  • : Ⅰ動詞1 (回答) answer; reply 2 (對待; 對付) treat; cope with; counter 3 (朝; 向; 面對) be tr...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 端對 : end on端對耦合 end-on coupling
  1. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新的一次性口令認證機制。針postgresql原有認證機制具有易遭受口令猜測攻擊和服務器假冒攻擊的缺陷,本文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何系統,就能有效各種攻擊手段的防範能力。
  2. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    數據調制器完成計算機輸出的控制信號處理,將指令碼載送到一指定頻率點。終收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現非授權用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到控制用戶通道的管理。
  3. This thesis regard internal property reorganization in the group of pangang as the research object, from chengdu seamless steel pipe limited liability company with chengdu iron and steel works inside exterior environment reorganizing in front and back commences, making use of to exceed the makel - bot with of five factors competition models and the method of factors analysis, after analyzing the reorganization of the business enterprise a profession for facing competes the situation. develop the development the business enterprise with the profession industry from the international local profession rival circumstance after analyzing the reorganization should the market position of the establishment with develop the strategy target. make use of the swot the analysis the method, to after the reorganization the development strategy of the business enterprise, from manage the angle proceeded the fixed position analyzes, for after the reorganization business enterprise development provided four kinds of developments strategy that eligibility choose : the brave development strategy, request the resources advantage, funds advantage, human resource advantage, technique advantage that new company make the most of new business enterprise in empress in reorganization, is an essential condition to increases to manage the level, quickly technique reforms, develop the high and additional worth product with new product production line, as soon as quikly change to strong and large business enterprise, realizes soon steel aircraft carrier dream ; dispersion strategy, the technology market quota with deal with produce high additional worth product, completely promote business enterprise brand image, extend high carry product of the exaltation product, is a necessary means to increases business enterprise performance, realizes business enterprise target ; defense strategy, adjusting the business enterprise organizes construction, reducing the intensive type in labor and the low additional worth product line, lower bad the property saves the deal, alleviating the business enterprise burden, attaining the casual wear go to battle, benefitting to the challenge that make frontal attack the rival ; withdraw strategy, compress the production of the high depletion and high cost product, simplify the production craft, controlling the cost of the end product in the lower level, is a valid path to increases business enterprise competition ability

    本論文以攀鋼集團內部的資產重組為研究象,從成都無縫鋼管有限責任公司與成都鋼鐵廠重組前後的內外部環境入手,運用邁克爾?波特的五力競爭模型及因素分析法,分析了重組后的企業所面臨的行業競爭態勢。從國際國內行業競爭手情況和本行業發展動態分析了重組后企業應確立的市場地位和發展戰略目標。運用swot分析法,重組后企業的發展戰略,從管理角度進行了定位分析,為重組后企業發展提供了可選擇的四種發展戰略:即大膽發展戰略,要求新公司充分運用重組后新企業的資源優勢,資金優勢,人力資源優勢,技術優勢,是提高管理水平,快技術改造,開發高附值產品和新產品生產線,盡快立於強勢企業之林,早日實現「鋼鐵航母」夢的必要條件;分散性戰略,提高產品的科技含量和生產高附值的產品,全面提升企業品牌形象,擴大高產品的市場份額,是提高企業效益,實現企業目標的必要手段;防禦性戰略,調整企業組織結構,削減勞動集型和低附值產品生產線,降低不良資產存量,減輕企業包袱,做到輕裝上陣,有利於迎擊競爭手的挑戰;退出性戰略,壓縮高消耗、高成本產品的生產,降低低產品的比例,精簡生產工藝,將最終產品的成本控制在較低水平,是提高企業競爭力的有效途徑。
  4. To help protect the data transferred between clients and servers from eavesdroppers, you should encrypt it by using digital certificate technology

    為了幫助保護客戶和服務器之間傳輸的數據免於被竊聽者竊取,您應該使用數字證書技術數據進行
  5. Terrestrial trunked radio - security - synchronization mechanism for end - to - end encryption v1. 1. 1

    地面集群無線電.安全.端對端加密用同步化機制
  6. Coinpe with talihonal analog tnulking system, tetra system is apter to boplemen digltal encrypon of speech and data, but system securiiy is unable to depertd sdriply on enctwon. from the point of view of the b1lbrmation system security arehithebe, the author classified and concltuled the tetra system seeurity and wuced sytw security bo the wts of thnd analysis, security requirements, security sehaces and security mangemen etc. 111e mechbosm of authentication, tem1ina enable and disabq air intn encrypion, end - bend encmption led in tewh is the key ler in this n to the security question of practical application, the re1evant wt w and m are provided too

    但是系統安全不能單純依靠來保證,作者從信息系統安全體系的角度,tetra系統安全進行了分類歸納,從風險分析、安全需求、安全服務、安全管理等方面tetra系統安全體系進行了閘述,並tetra系統中主要應用的鑒權、終激活禁用、空中介面等安個機制進行了重點研究,同時針實際應用中出現的安全性問題提出了解決方法。
  7. Based on the analysis of relatively mature network security technology that can be introduced by sip, by the means of improving and applications, the article realizes tls hop - by - hop encryption, s / mime end - to - end encryption mechanism, improved http digest authentication, s / mime end - to - end signature mechanism and so on

    在分析現今可以借鑒的用來sip通信進行保護的相比較成熟的網路安全技術的基礎上,通過改進和應用,實現了包括tls逐跳, s / mime等的機制以及改進的http摘要認證, s / mime簽名等的身份鑒定機制。
  8. Further analyses are given to some important parts of the secure email system, such as digital signature, encryption and decryption. the author also describes in detail how to realize them. in the third part, it is proposed to use ldap server for distribution of the certificates and use sasl authentication in secure email system to ensure information security

    適于安全電子郵件的演算法從hash 、簽名到、認證進行了比較分析;二是根據s mime協議提出了安全郵件系統的體系結構,其重要的數字簽名、和解部分作進一步的分析,給出了具體實現步驟並進行了實現;三是基於ldap協議設計了用戶證書和通信簿管理體系,建立了ldap服務器客戶數字認證模型,並進行了實現。
  9. The experiments reveals that : the amount of water vapor transfer is affected by both water content gradient and the value of water contents, when the water content of one end is approximate, the water content gradient increases, then the amount of water vapor transfer increases ; when the water content gradients are approximate, the amounts of water vapor transfer can get great differences if the water contents are different, under this condition when the water content of the dry soil is very little, the amount of water vapor transfer is much greater ; the differences of density hav n ' t great effects on water vapor transfer, but have some effects on the admixture transfer, when the density is smaller, the amount of admixture transfer is greater. the water vapor transfer finishes more quickly and need less time, and the liquid water finishes more slowly and need less time

    當一含水量一定時,增含水量梯度,則氣態水遷移量增大;當含水量梯度相近時,氣態水遷移量隨含水量不同可能相差很大,這種情況下當較干段含水量特別小時,氣態水遷移量相較大;實度的大小于氣態水遷移的影響並不明顯,但液態水和氣態水的混合遷移有一定的影響,在相同的實驗時間內,土體實度較小,則混合遷移量相較大;氣態水遷移完成速度較快,所需時間較短;液態水遷移完成速度較慢,所需時間較長。
  10. Utilizing the design of external shell, dual axis capacitive accelerometer was succeeded, and the sensitive properties were characterized and analyzed. with the assistance of signal processing circuit consisted of amplifier circuit and filter circuit, the signal from the sensitive chip is converted into the voltage signal that meets the product performance requirement. moreover, we employed micromechanical technique to fabricate the

    信號處理電路通過放大電路及濾波電路,將敏感晶元輸出的電壓信號轉換成符合產品性能指標的電壓信號,經過電路模擬及實驗驗證了電路的可行性;利用精機械工技術製作的外殼使得傳感器整體化、小型化;產品實際性能測試和環境試驗后表明,該傳感器主要技術指標滿足設計要求。
  11. Model of data remote transmittal based on ca authentication is compound by ca authentication and sensitive data security. on one hand, ca authentication is developed on the basis of openssl function libraries, which provide secure and reliable channel for sensitive data between two communication terminals ; on the other hand, sensitive data in server database is encoded by fields, which keep invisibility for non - correlation persons

    基於ca認證的數據遠程存取模型是我們利用基於openssl函數庫開發的ca認證過程來為通信兩提供安全可靠的通信通道,具有信息保、信息完整性、身份認證等功能,同時,企業重要數據欄位進行,來保證數據庫的數據安全。
  12. Cas scrambles service streams with control word at head - end and broadcast the encrypted control word together with services streams. it is cas ' s responsibility to make sure only entitled terminal can decrypt the control word and descramble service streams. this paper mainly focuses on the design and implement of conditional access systen

    數字電視的條件接收總的思路是在前節目流進行數字擾,同時把擾控制字后廣播出去,條件接收系統採用一定的策略使得只有授權用戶可以解控制字,然後用控制字解擾收看節目。
  13. Next, according to symmetry encryption, asymmetry encryption and certificate in encryption principle and encryption programming in java, implements secure and creditable communication between client end and server end

    其次,利用碼學原理中的、非以及證書,結合java中碼學編程,從而實現客戶和服務器安全和可信的通信。
  14. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入的基於公用數據網路分組交換技術的系統網路體系結構,並針網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據等技術手段提高系統的網路安全性能。
  15. In this thesis, the database of gps vehicle monitor information management system is designed, the design of the man - machine conversation interface and the software of the database server, also the software of the mid - ware are accomplished. an improved and logical three layer structure framework is used to utilize the resource of the system efficiently, balance the load, and improve the expansibility of the system ; powerful oracle database is used as background database to provide high performance service to the system which has numerous users and large - scale ; encrpytion arithmetic of communication data is designed to ensure the safty of gps vehicle monitor information management system communication ; the usage of fire wall, system privilege management and data backup improved the safty of the information management system database ; high usability design is realized by oracle data guard ; optimization of the information management system made the whole gps vehicle monitor system persistent, stable and high quality

    本文針原有gps車輛監控系統響應速度慢、穩定性和安全性不高的不足,提出了一種以改進的三層結構體系為系統架構,以oracle數據庫為后臺的gps車輛監控信息管理系統設計方案,設計了gps車輛監控信息管理系統數據庫,完成了gps車輛監控信息管理系統人機界面、中間件及數據庫的軟體設計。系統架構採用改進的三層結構體系,其邏輯結構清晰,有利於系統資源的有效利用,均衡負載,提高系統的可擴展性;后臺數據庫採用功能強大的oracle數據庫,可以提供大規模、多用戶的高性能服務;通信數據的演算法有利於確保gps車輛監控信息管理系統的通信安全;防火墻的使用、系統權限管理以及數據的備份和恢復等有利於提高gps車輛監控信息管理系統數據庫的安全性, oracledataguard的使用有利於提高系統的可用性;系統的優化,為系統持續、穩定、高質量運行創造了有利條件。
  16. In addition to these security architecture components, analysis services encrypts all client server communication to reduce the risk that unauthorized users can gain access to unauthorized information

    除了這些安全體系結構組件以外, analysis services還會所有客戶/服務器通信進行,從而降低未經授權的用戶訪問未經授權的信息的風險。
  17. In respect to financial cipher database system configuration design, we adopt encryption mode in dbms rind, and accomplish identification and data encryption etc. through adding encryption management program in client, and security deputy program between application and dbms

    于財政文數據庫系統的結構設計,本文採取在dbms外層的方式,通過在客戶管理程序,在應用程序與dbms之間入安全代理程序,實現了身份認證和數據的等功能。
  18. Since the gsm network has its own security mechanism, the in - the - air encryption algorithm is enough for most wap services. however, to implement safe end - to - end services with stringent requirements, like online banking and other financial transactions, additional security is needed

    Gsm網路本身有很好的安全機制,空中演算法大多數wap業務足夠了。但如果wap要實現一些需求嚴格的安全的業務,如在線銀行及其它金融交易,還需要增數據的安全性。
  19. Dialog security provides end - to - end encryption and remote authorization for conversations to specific services

    話安全模式為到特定服務的會話提供和遠程授權。
  20. Service broker dialog security provides end - to - end encryption and authorization for conversations between specific services

    Service broker話安全模式為特定服務間的會話提供和授權。
分享友人