解密文件系統 的英文怎麼說

中文拼音 [jiěwénjiàntǒng]
解密文件系統 英文
encrypting file system
  • : 解動詞(解送) send under guard
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ量詞(用於個體事物) piece; article; item Ⅱ名詞1. (指可以一一計算的事物) 2. (文件) letter; correspondence; paper; document
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 解密 : deciphering
  • 文件 : 1 (公文、信件等) document; file; papers; instrument 2 [自動化] file; 文件保護 file protection; ...
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. This paper discusses some important technologies closed to dtv receiving system deeply, base on scn and cctv. it includes mpeg - 2 system level, dvb service information, conditional acceptance. it also describes how to realize epg, ca, upgrade on line etc based on the dtv service information technology at lengtho now, the production of this design is applied to the digital tv products of cctv and sichuan tv net

    本論結合數字電視在四川廣電網和cctv的具體應用情況,深入研究探討了與數字電視接收相關的部分關鍵技術,包括mpeg - 2層結構分析、 mpeg - 2和dvb業務信息分析、數字電視條接收基本原理和加擾及加技術,並詳細敘述了如何運用數字電視業務信息技術實現了電子節目指南、條接收、在線升級等基本業務。
  2. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的決方案.所謂水印技術就是將數字、序列號、字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘通信、數據的真偽鑒別和產品標志等作用.本提出了一種新的基於奇異值分的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  3. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子歸檔時檢驗原始性、真實性的唯一依據;電子歸檔管理層中的主要任務是要建立起嚴的歸檔制度,同時結合「生命同期表」建立檢驗措施保證電子在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理性:建立電子與電子檔案原始性、真實性保護體安全控制,通過對工作人員授權分散化、建立用戶標識與認證技術等措施確保「保護體」安全運行;加強「保護體」涉及的標準與規范的制定工作,如建立一的歸檔電于、電子檔案基本結構等標準對保護電子、電子檔案信息原始性、真實性有著重要意義。
  4. Finally, studies the instruction system of cos upon a dedicated instruction of smartcos - xc. chapter 4 discusses the smartcos - xc and gives the design and implementing of a smart card file system framework. based on this, this paper gives a simulation of head - end encryption of entitlement control message ( ecm ) and entitlement management message ( emm ), and implements the decryption of ecm and emm in the smart card

    在對通用cos的研究的基礎上,首先簡單分析了smartcos - xc ,結合該cos ,論針對有條接收,按不同用途、不同類型分別設計並實現了存儲用戶授權及智能卡應用的結構,通過該cos的指令,設計並實現了模擬前端授權控制信息( entitlementcontrolmessage , ecm ) 、授權管理信息( entitlementmanagementmessage , emm )數據生成模塊及用戶端ecm 、 emm模塊。
  5. In this dissertation, the pivotal points relating to conditional access system, including the framework of mpeg - 2 system layers, the de - multiplexing of mpeg - 2 system, the service information table of mpeg - 2 and dvb, the encryption and decryption method for digital tv conditional access system, are fully discussed according to the market requisition. there is also a probe into the feasibility and security aspect of the coherent descramble algorithm

    本論結合市場需要,詳細研究探討了與數字電視有條接收相關的部分關鍵技術,包括mpeg - 2層結構分析、 mpeg - 2復接技術、 mpeg - 2與dvb中業務信息表分析、數字電視有條接收加擾技術
  6. We regulate a command - response pair for the encryption / decryption operation based on permutation code, combining rsa and md5 used in cos safety module, and bring forward a safety transmission process for documentation

    並給排列碼加操作賦予相應的命令應答對,結合智能卡操作的安全模塊中的rsa演算法和md5演算法,提出了使用這種數字簽名卡進行安全傳輸的過程。
  7. In addition, the paper will analyze the existence condition for nonwandering semigroup by the methods of topological dynamical system. from the mature results of finite dimensional space, such as the topological mixing, we discuss any other methods to solve the problems of infinite dimensional space, so as to provide the similar methods for the similar work

    另一方面,本將結合微分動力和拓撲動力的研究方法,主要從微分動力的角度,從根本上分析非游蕩運算元半群存在的條,並結合與此切相關的有限維空間的一些成熟的理論,如拓撲動力中的拓撲混合性等,從不同角度試圖決無窮維空間的結論。
  8. Using the theories of probability, algebra and number theory comprehensively, we investigate a class of boolean functions with three - valued walsh spectrum in the first part of this dissertation : the properties of the extended semi - bent functions, which are constructed from any two bent functions, are studied, followed by the structure characteristics of the boolean functions satisfying propagation criterion with respect to all but two vectors ; the definition and cryptographic properties of k - order quasi - bent functions are proposed whose walsh spectrum takes on only three values. some sufficient and necessary conditions are offered to decide whether a boolean function is a k - order quasi - bent function ; a special method is presented to construct the k - order quasi - bent functions, whose cryptographic properties are explored by the matrix method, which is different from the method of walsh spectrum and that of autocorrelation of boolean functions ; the application of this kind of boolean functions in the fields of stream cipher, communications and block ciphers is discussed, which shows the great importance of the fc - order quasi - bent functions ; some methodology are proposed to construct the k - order quasi - bent functions, including the complete construction by using the characteristic matrices of boolean functions, and the recursive method by two known k - order quasi - bent functions we further extend our investigation to the ring zp, where p is a prime, and the similar results are presented as far as the p - valued quasi - generalized - bent functions are considered

    首先綜合運用概率論、代數學、數論等基礎學科的理論知識,並以頻譜理論作為主要研究工具,對一類譜值分佈相對均勻的函數? ?廣半bent函數、 k階擬bent函數和p值k階擬廣義bent函數進行了、深入的研究,給出了廣半bent函數定義,並探討了廣半bent函數的碼學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的定義及等價判別條;討論了k階擬bent函數和p值k階擬廣義bent函數與部分bent函數和p值廣義部分bent函數的關,探討了它們的碼學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的典型構造方法,並將對k階擬bent函數的碼性質的研究轉化到對一類特殊的矩陣的研究上;利用布爾函數的特徵矩陣原則上給出了k階擬bent函數的一種完全構造方法,還給出了從已有的p值k階擬廣義bent函數出發,遞歸構造變元個數更多的p值k階擬廣義bent函數的方法;初步探討了k階擬bent函數在序列碼、分組碼以及通信中的應用;給出了一類布爾函數walsh譜的分式,並利用這類布爾函數的walsh譜分式給出了一類近似穩定的布爾函數的構造,特殊情形下為k階擬bent函數;利用代數數論的知識考察了p值k階擬廣義bent函數的譜特徵,並給出了k階擬廣義bent函數與所有仿射函數的符合率特徵等等。
  9. It is responsible for deciphering class files and uploading into java virtual machine ; class verifier is used to the correct internal structure ; security manager is used to customize the access strategy and permission ; and ssl guarantees the data security during transmission. though modeling and testing a prototype system, experiment proved the correctness and efficiency of above design

    類裝載器是java安全體的第一道防線,它負責將類后裝入java虛擬機; class檢驗器保證裝載的class有正確的內部結構;安全管理器主要用於定製用戶對的訪問策略和訪問權限;安全套接字用來保證web傳輸安全。
  10. Then the article introduces the design and realization of user level monitor module and kernel level monitor module detailedly, including how to realize the system clipboard monitor, the file motion control, file print job interdiction, and the directory share monitor in system ’ s user level, how to realize the process accessing filter, the process privilege control, the file encryption and decryption in system ’ s kernel level

    詳細給出了用戶層監控模塊和內核層監控模塊的設計和實現,包括如何在操作用戶層實現剪貼板監控、移動控制、共享目錄監控、列印阻斷等,如何在內核層實現進程訪問過濾、用戶進程權限控制、透明加功能。
  11. It receives credentials coming from ipsec entity. through its policy compliance checking to verify whether these credential are trustable, so determine whether these acts were authorized and under what conditions will be permitted. this kind of function will be very useful in the procession of resolving conflicts between different ipsec entities policies. in the light of such theory, the thesis developed an ipsec policy system based on the keynote which is the realization of “ trust management ”

    通過一致性檢驗機構接收ipsec提交的安全策略與ipsec自身信任的安全策略相比進行一致性檢驗,從而確定了該ipsec的鑰協商過程是否符合「信任管理「的規范,也就確定該行為是否被許可以及在何種限制條下的許可。這樣就進一步決了安全策略沖突的問題。本就是在此理論基礎上初步實現了一個基於keynote信任管理的ipsec策略管理
  12. If the technicians applied technology in the wrong, even achieving the business logic, but probably leading to many vices including low performance, low scalability, close coupling, low software duplication. so how to assemble the j2ee technology reasonable and achieve a system with high performance and high expansibility is my research emphasis in the thesis. in order to solve the problems and implement efficient web application, the paper put forward ejs _ mvc model according mvc pattern and we can assemble component by using ejs _ mvc model, it can solve many problems of web application and improving system with clear flow and clear function partition, in addition, due to controller is the most importance in the ejs _ mvc model, so the thesis also discuss some problems about controller design ; if the model is not designed accurately, system performance will encounter fatal influence, so the article lucubrate ejb technology from ejb choice, ejb optimized design, database access, design pattern etc and bring forward some strategies and methods about how to build efficient business tier ; finally based on ejs _ mvc model, a example that contains simple business logic is developed according to the object - orient software engineering thinking and some strategies and methods proposed by the thesis, in the process of achieving system function, the emphasis is probing into how t o assemble and apply technology reasonable and providing a new thinking thread and method contributing to build high effective and flexible j2ee application

    由於j2eeweb應用是由組組成,因此為了決上述問題,實現高效的應用,本首先從如何合理組合組入手,找到一種方法使各組能具體分工而又緊合作,在深入研究各組基礎上,根據mvc模提出了ejs _ mvc模型概念,指出可按此模型組合各層組,該模型可以決傳web開發中存在的問題,而且具有流程與功能劃分清晰,可擴展性、可維護性強等優點,另外由於控制器是ejsmvc模型的重中之重,它起到承上啟下的作用,它設計好壞直接關繫到整個應用的性能、伸縮性與擴展性,因此又探討了控制器設計的有關問題;另外如果模型設計不當的話,對性能造成的影響可能是致命的,因此本又從ejb組選擇、 ejb調優設計、數據庫訪問和設計模式等方面對ejb技術作了全面的分析研究,指出在業務層中如何避免太多網路遠程調用和提高業務層性能,特別是根據前面的分析總結出了業務層的優化分層組合模型,這個模型的使用無疑會使業務層具有較高的性能與伸縮性;最後選擇一個業務邏輯較簡單的,使注意力集中到運用的j2ee技術上來,按照ejs _ mvc模型與軟體工程流程以及本論所提出的方法與策略實現業務邏輯,在實現過程中具體探討如何合理運用組合技術,就多層j2ee體結構的設計思想作深入的探討實踐,為實現高效、靈活的多層j2ee應用提供一種新的思路及方法。
  13. In this paper, the design idea, the system composition, the theory of the primary algorithm and the function composition of every sub system are introduced mainly

    主要介紹了「基於級數據加應用」的設計思想、結構、主要演算法的原理、各子的功能結構等。
  14. If you are running microsoft windows 2000 and want to use the windows 2000 encrypted file system to encrypt any sql server files, you must unencrypt the files before you can change the sql server service accounts

    如果要運行microsoft windows 2000並使用windows 2000加對所有sql server進行加,必須首先這些,然後才能更改sql server服務帳戶。
  15. We deeply studied the requirement of the security email and the procedure of the transportation of emails over the network, and give out during the period that we worked on this subject, we first studied the status of the current internet email system and the requirement of security email in detail, then studied every period that the emails exist on the internet, the threats facing them, and the imaginable applications of the security email in real life. we have read many materials those relate to the security of information transporting on the internet, and we have refer to many network information security modules and experiences of the other email service providers. based on all of these, we give out a whole solution from the client side to the server side, we not only provide the confidential service for the email users, but also provide the signature, anti - deny and anti - impose security services

    在課題開發的過程中,我們首先深入詳細地調研了整個郵的現狀以及對郵安全的需求,然後從網路信息安全的角度,對郵傳輸的各個環節、每個環節所面臨的安全隱患、以及安全郵在現實生活中可能的應用進行了深入的研究,我們先後查閱了與網路信息安全郵相關的大量獻,參考了許多現有的網路信息安全模型,並且參照了現有其它郵服務提供商的web安全郵的一些安全做法,分析了它們的優缺點;在此基礎上,結合中國的實際情況,我們提出了web安全郵的從客戶端到服務器端完整的決方案,方案中不僅為用戶提供了郵性服務,還提供了郵簽名,防抵賴,防篡改等安全業務,滿足了人們對郵安全的迫切需要。
  16. Next, this paper studies the pki technology, ssl protocol and smart card technology, and then put forward a security email solution, which solves some problems as follows : ( 1 ) protect email subject secret ( 2 ) realize email header safe transmission ( 3 ) security keys management then, this paper uses existing products ( wallgreat kmc ) to build a pki platform, and realize a model for this solution, which includes a secure email server and an email client

    研究了pki技術、安全套接層ssl協議和智能卡技術,並在此基礎上提出了一種安全郵決方案,旨在決以下問題: ( 1 )郵主題的保性問題( 2 )郵頭的安全傳輸問題( 3 )鑰的安全管理問題接著,本利用公司己有產品(華翔騰鑰管理中心)搭建pki平臺,設計並實現了該決方案的一個模型,該模型包括安全電子郵服務器和客戶端。
  17. Different modes of software control, which aim at different usage environment and enhance raid system performance and data dependability, are designed. the project can be applied in compatible pc system, which can be used for the public and commercial purpose and in self - defined, financial and military system. the technology of large - scale information storage is on the ascendant

    本方案可以應用兼容pc的方案,這樣的可以在民用和商用環境中應用;也可以應用自定義,採用自定義,加方案和分割方式,可大大提高數據的可武漢理工大學碩十學位論靠性和保性,這樣的可以在金融和軍用環境中應用。
分享友人