通信保密信息 的英文怎麼說

中文拼音 [tōngxìnbǎoxìn]
通信保密信息 英文
communications security information
  • : 通量詞(用於動作)
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • 通信 : communication; communicate by letter; correspond
  1. ( 3 ) according to the characteristics of the selected objects, the selecting processes and the practical problems in the process of establishing a scm - oriented ave, a three - stage plan and evaluation architecture of partner enterprise selection are presented and a multi - objective optimization model for selecting partner enterprises in aves are given. by means of the methods of integer planning, benchmarking, analytic hierarchy process ( ahp ) and so on, the fuzzy values of critical decision - making factors ( such as

    過實際應用驗證,該erp系統具有統?一致的編碼、較好的開放性、集成性、外延性,併兼顧了自動與人工、用化與行業化兩方面,使系統具有較高的柔性和較強的實用性,可輔助企業實現科學、可靠的產品報價和即時生產it卜該erp系統既不失mnyll的系統性和嚴性,又持了ji
  2. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了技術以及各國立法對碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  3. The high - power semiconductor quantum well ( qw ) laser is a kind of luminescence device with superior performance, it has longe - lived, low threshold current density, high efficiency, high luminosity and excellent monochromatic, coherence, directionality, etc. the high - power semiconductor laser is widely applied to the fields, such as military, industrial machining, communication, information processing, medical treatment, etc. the material ' s epitaxy is the foundation of the whole laser ' s fabricating, and it has important influence on the optics and electricity performance about the laser

    大功率半導體量子阱激光器是一種性能優越的發光器件,具有壽命長、閾值電流度低、效率高、亮度高以及良好的單色性、相干性、方向性等特點,廣泛應用於軍事、工業加工、處理、醫療健等領域。材料的外延生長是整個激光器器件製作的基礎,對器件的光學和電學性能有著重要的影響,生長不出優質的材料體系,獲得高性能的器件就無從談起,因此,材料的外延生長便成為了整個半導體激光器製作過程之中的重中之重。
  4. The thesis opens with expounding the organizational model, the development trend of human resource, the changing environment in the knowledge economy age, with the key factor that influences the smooth progress and contributes to the success of the administrative reform on this basis, this thesis analyses in detail analyses the theories of the enterprise strategy, the strategic management of the human resource, and the problems that the enterprises have encountered the human resource management during the administrative reform, such as the employees " psychogenesis crisis, employee training, business enterprise culture and the programming for the employees " career in order to attract to stay on, which will do good to the enterprises and the employees, besides this thesis offers some corresponding suggestions to these problems

    因此,在組織變革的過程中,人力資源管理的重要性就凸顯出來。本論文首先過對組織所處的外部環境分析入手,指出了組織變革的必要性和重要性;並分析了新經濟下組織模式的發展變化趨勢,得出組織變革和人力資源管理之間的切關系,並指出有效地人力資源管理是組織變革成功的根本障。其次,分析了在經濟全球化、化、知識化的新時代下,組織變革與發展過程中必然給人力資源管理帶來新的挑戰,其中剖析了人力資源管理職能的變化,人力資源管理角色的轉變以及當前人力資源管理發展的新趨勢。
  5. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中性和完整性。
  6. As a new branch of information security, information hiding technology including digital watermarking and steganography aims to protect intellectual property rights of multimedia contents and to send secret messages under the cover of a carrier signal

    隱藏是安全領域中的一項新興技術,主要有數字水印和數字寫兩大分支,分別用於多媒體數據的版權護和隱蔽
  7. Another advantage, contrast to using convolutional codes or turbo codes, is its low complexity while maintain high ber performance because the check equations are used to terminate the both iterations. we develop the theoretical error free feedback bound for bpcm - id and predict the threshold for decder convergence using the extrinsic information ransfer chart ( exit )

    利用非正則ldpc具有不同度的節點概率度演化的差異,對高階星座中具有較高級別的子道提供額外的護,可使迭代反饋判決時,星座子集擁有最大的無錯反饋歐氏距離調和均值,從而改善系統的迭代收斂特性。
  8. China information security

    安全與
  9. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算機系統安全體系模型和實施標準的不足,本文緊圍繞分層、分級、動態防禦以及協同平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算機系統安全體系建設的動態縱深防禦安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全防護層次的概念,提出了類別、威脅級別和安全障級別的定義,闡述了進行計算機系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技術的分級要求,從而便於進行計算機系統的安全設計以及產品的選型; 4 )設計並基本實現了用於障上述安全體系動態協同能力的協同平臺。
  10. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權護方法,另外系統在網路環境下的安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權嵌入到多媒體數據中,以起到版權護、秘、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  11. The information gained by the eavesdropper through interception is a very important criterion for judging the success of the key transmission and a necessary parameter for the privacy amplification

    竊聽者過竊聽所獲取的量是決定鑰傳輸是否成功的重要指標,同時也是增強這一技術環節的必要參數。
  12. Moreover, this algorithm can be implemented very easily in software, and has a good prospect in the fields of secret communication and information security

    此外,本演算法還特別易於軟體實現,在安全領域具有良好的實際應用前景。
  13. Phishing : a type of technology - based social engineering ploy in which computers users are directed, usually via e - mail, to a web site that purports to be that of a bank, loan company, credit card company, e - commerce merchant, governmental agency, or other site that requires users to enter confidential information, such as account passwords, account numbers, social security numbers, and other personal data that is collected and used for identity theft

    網路釣魚:基於社會工程學的技術,過電子郵件,據稱是銀行,貸款公司,用卡公司,電子商務商,政府代理的網站,或其他要求用戶輸入機的站點,諸如帳戶碼、帳戶號、社會險號的機被收集並用於身份偷竊。
  14. The digital watermarking technology can accomplish copyright protection and content authentication by embedding secret information in the original product

    數字水印技術過在原始作品中嵌入秘來實現版權護和內容認證。
  15. In this article, two projects - " sqy - 15 encrypt subsystem of hospitalization insurance system " and " general image compress flatform " are combined to get a resolvent scheme to realize data encrypt and image compress based on digital signal processor ( dsp ) and application specific integrated circuits ( asic ). this article includes three key technologies in designing and realizing the data encrypt card and the image compress flatform. they are : ( 1 ) design of dsp application system ; ( 2 ) epld designing technology using vhdl language ; ( 3 ) pci interface technology

    本文結合「 sqy - 15醫療系統加子系統」和「用圖像壓縮平臺」兩項目,提出了基於數字號處理器( dsp )和可編程專用集成電路( asic )實現數據加卡和圖像壓縮平臺的解決方案,重點介紹了基於dsp的數據加解卡和圖像壓縮平臺設計與實現中的三個關鍵技術: ( 1 ) dsp應用系統設計; ( 2 ) vhdl語言設計epld技術; ( 3 ) pci介面技術。
  16. This essay firstly systematically introduces the theories and key technologies of vpn with the detailed presentation of the functions of safety manage central - - - - the automatic production and distribution of passwords, remote - controlled destroy of passive and active passwords, loading special data in air and special tracing of cell phones that are out of control. besides, the researchers has analyzed the contents and findings of similar researches both domestics and overseas with the emphases on the in - depth research of safety communication gateway in order to confirm a system model and carry out the macro - design. after that is the detailed introduction of the design realization of special information transportation

    本文首先系統地介紹了gsm移動專網的原理知識及關鍵技術,詳細介紹了安全管理中心的功能- -鑰自動產生和分配、被動式和主動式鑰遙控銷毀、專用數據空中加載、以及失控專用手機追蹤等,並且對國內外同類研究的內容和成果進行分析;重點對安全網關進行了深入研究,確定了一種系統模型並進行了總體設計,然後對其中專用傳輸的設計實現進行重點介紹;本文還對安全管理中心的短消安全網關與專用手機進行性能測試,測試結果表明該系統符合課題的各項技術指標,實現了安全網關的各項功能需求;最後,總結課題工作,對下一步系統進行完善和發展的內容提出了具體建議。
  17. Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities

    首先對電子政務系統網路的安全進行了分析,其中包括網路的安全風險分析、安全需求分析、安全目標分析,以及電子政務的安全策略分析;然後,從物理安全、訪問控制、、數據護、安全審計、病毒防護、安全備份和安全管理等方面對電子政務網路安全解決方案進行了分類研究;最後,作為一個研究應用工程實例,過對綿陽市電子政務網路的風險分析及安全需求分析,對其網路安全的整體解決方案進行了詳細設計。
  18. Instead encrypt data in pc, it transfer data to " source encryption equipment " via usb connector. after completion encryption / decryption operation, the encrypted data is returned. all encryption / decryption operations are performed in " source encryption equipment ", which assure the security of information

    過usb介面將要加的數據傳到加機,在加機中實現數據加解,加解過程脫離操作系統,有效地了的安全。
  19. Cryptic watermarking means secret information can be hidden in public data as watermark, so observer and monitor system can not be conscious of existence of secret information, then we can realize cryptic communication and secrecy storage

    隱蔽水印是指將秘作水印隱藏在公開的非機的數據,使觀察者和監測系統無法察覺秘的存在,從而實現隱蔽儲存。
  20. Enabling up to 14 levels of access rights, apeos wizshare s comprehensive suite of security capabilities ensures comprehensive information disclosure and protection controls over sensitive corporate information

    Apeos wizshare支持多達14個級別的訪問權限。面面俱到的安全功能組合,既周地管理企業的機,又證了必要的有效流
分享友人