通信保密制 的英文怎麼說

中文拼音 [tōngxìnbǎozhì]
通信保密制 英文
secrecy system
  • : 通量詞(用於動作)
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 通信 : communication; communicate by letter; correspond
  1. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控、基於bell - lapadula模型多級安全規則的強訪問控以及基於biba模型的強訪問控等多種安全策略,從而有效地增強了操作系統中息的性和完整性。
  2. It is respectively : production, facility for transporting operates personnel : jockey of lathe work, milling, grinding work, boring labour, solderer, modular machine tool, machining center jockey, casting matchs benchwork, besmear to install ship - fitter of ship - fitter of equipment of benchwork of labour, tool, boiler, electric machinery, discretion to control ship - fitter of appearance of ship - fitter of appearance of instrument of electric equipment ship - fitter, electron, electrical engineering instrument, machine ; irrigation works of aricultural herd fishing produces personnel : inspector of quarantine of the member that animal epidemic disease prevents and cure, animal, firedamp produces work ; personnel of line of business of commerce, service : the member that assistant, bagman, publication is issued, chinese traditional medicine purchase and sale, clerk of the member that the division of division of appraisal appraisal division, chinese style noodle, chinese style noodle, western - style cook division, western - style noodle division, division that move wine, nutrition distributes food, dining - room, antechamber clerk, client clerk, health care ; handle affairs personnel and concerned personnel : secretary, public relations member, the member that terminal of communication of computer operator, cartographer, operator, user is maintained

    分別是:生產、運輸設備操作人員:車工、銑工、磨工、鏜工、焊工、組合機床操作工、加工中心操作工、鑄配鉗工、塗裝工、工具鉗工、鍋爐設備裝配工、電機裝配工、高低壓電器裝配工、電子儀器儀表裝配工、電工儀器儀表裝配工、機修鉗工、汽車修理工、摩托車維修工、精儀器儀表修理工、鍋爐設備安裝工、變電設備安裝工、維修電工、計算機維修工、手工木工、精細木工、音響調音員、貴金屬首飾手工製作工、土石方機械操作工、砌築工、混凝土工、鋼筋工、架子工、防水工、裝飾裝修工、電氣設備安裝工、管工、汽車駕駛員、起重裝卸機械操作工、化學檢驗工、食品檢驗工、紡織纖維檢驗工、貴金屬首飾鉆石檢驗員、防腐蝕工;農林牧漁水利生產人員:動物疫病防治員、動物檢疫檢驗員、沼氣生產工;商業、服務業人員:營業員、推銷員、出版物發行員、中藥購銷員、鑒定估價師、中式面點師、中式面點師、西式烹調師、西式面點師、調酒師、營養配菜員、餐廳服務員、前廳服務員、客戶服務員、健按摩師、職業指導員、物業指導員、物業治理員、鍋爐操作工、美容師、美發師、攝影師、眼鏡驗光員、眼鏡定配工、家用電子產品維修工、家用電器產品維修工、照相器材維修工、鐘表維修工、辦公設備維修工、育員、家政服務員、養老護理員;辦事人員和有關人員:秘書、公關員、計算機操作員、圖員、話務員、用戶終端維修員。
  3. The effects of the meteor trails orientation on the size and shape of the footprint on the ground are calculated, which the mechanism of good concealment, antijam and low probability of intercept is explained. this method overcomes the classical limitation

    其次用數學的方法研究並計算了流星余跡的方位對地面「足跡」的形狀和大小的影響,從而揭示了流星突發具有性好、抗干擾性、抗攔截的物理機,克服了經典方法的缺陷。
  4. Although the long pn sequence modulation has been used widely in the military communication with the good secrecy performance and restraint of jam between symbols, there is scarcely any research of long pn sequence modulation signals. so it is significant to research the estimation of long pn sequence modulation signals

    由於目前尚未有對長pn碼調號進行檢測和參數估計的研究,而長碼調較好的性能以及抑部分符號間干擾的優點,使其在軍事中有著較好的應用前景,因而此部分工作具有重要的意義。
  5. Traditional laser iff has poor security because of low frequency of laser beam coded pulse. this can be greatly improved when the pulses are modulated by continuous wave laser, but the power of this laser beam output is so low that it ’ s difficult to be detected and received by laser warning subsystem

    傳統的激光敵我識別器激光編碼脈沖頻率低,性差,使用連續波激光器經調后激光編碼脈沖頻率高,性好,但輸出激光功率較低,難以達到激光告警分機探測接收的要求。
  6. By using optical cable communication methods, which have advantages of great information transmission capacity, rapid velocity, wide frequency band, strong anti - jamming capability, low circuitry loss and easy construction, modern sky - wave over - the - horizontal radar can achieve information transmission and system control of full coherent radar, which has excellent abilities of security, stabilization, anti - jamming and anti - destruction

    過採用光纖傳輸技術,利用其息傳輸容量大,速度快,頻帶寬,抗干擾能力強,線路損耗低,易於施工等特點,實現全相參雷達的息傳輸和系統控,具有優良的性,穩定性、抗干擾性和抗摧毀能力。
  7. Information - theoretically secure secret - key agreement is the key to make perfect security. the models of unconditional security from quantum channels and noisy channels are two typical methods now. once the secret - key has been agreed over a public channel, one can use the key to encrypt messages by using one time pad

    現在常的做法是雙方使用有擾道或量子道建立無條件安全模型,然後在公開認證道上交互息進行鑰協商,雙方把協商之後的安全的鑰作為雙方共享的鑰使用一次一進行
  8. Optical attenuation, widely applied in many fields, can be adopted to acquire single - photon sequence that is foundational in quantum key distribution. we obtain single - photon sequence by precisely controlled optical power distribution along outlets of manifold consist of beam splitter instead of the attenuation by time sequence due to loss

    用線性分束耦合器形成多個輸出口,將光強的時序衰減變為光強沿輸出口的空間分佈,研製出了量子用的精的強衰減器,實現了對光子數的精
  9. Based on the analysis of relatively mature network security technology that can be introduced by sip, by the means of improving and applications, the article realizes tls hop - by - hop encryption, s / mime end - to - end encryption mechanism, improved http digest authentication, s / mime end - to - end signature mechanism and so on

    在分析現今可以借鑒的用來對sip進行護的相對比較成熟的網路安全技術的基礎上,過改進和應用,實現了包括tls逐跳加, s / mime端到端加等的加以及改進的http摘要認證, s / mime端到端簽名等的身份鑒定機
  10. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群系統加的研究,首先介紹了數字集群系統的安全,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加過程及其鑰的選用和管理,特別介紹了端到端加;然後介紹了幾種常用的加演算法,過分析其優劣,提出了端到端加的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群系統加方案的設計,其具體過程為將經過數字號送入加器里,和以idea加演算法為基礎設計的碼流發生器( ksg )產生的碼序列進行加解運算,並且研究了此加過程的碼同步問題。
  11. A simple structured chaotic modulation circuit for secure communication system

    一種結構簡捷的混沌調系統電路
  12. Ideal single photon sources are far beyond real application. in practice, single photon sources being used are gained from precisely controlled heavy attenuation. to analyse the security of quantum key distribution system based on practical single photon sources is being very important

    單光子是量子的一大技術關鍵,也是安全的基礎,但是理想的單光子源離實際的使用還很遠,目前實際使用的單光子源是由精的強衰減技術得到的。
  13. The algorithm have the good one - way property, high sensitivity to initial values and good security due to the intrinsic characteristic of chaotic system and rijndael algorithm. the simulation experiment demonstrates the convenience and good hash performance ; 3 ) a new scheme of digital voice secure communication was proposed based on chaotic modulation without additional synchronization. the modulation sequence generated by chaotic logical mapping was used to encrypt the digital voice signal

    混沌系統和rijndael演算法的固有特點使該演算法具有較好的安全性、對初值有高度的敏感性以及較好的單向性能,並且易於實現,是一種有效的單向hash函數; 3 )研究了一種無需同步的基於混沌調的數字語音系統的方案,利用邏輯映射產生混沌調序列,以該序列作為碼對數字語音進行加處理,為了更好的隱匿號特徵,混沌調在小波分解的基礎上,對不同的道使用不同的參數進行,並借鑒混沌掩蓋對號進行了限幅處理,使文完全隨機化。
  14. It can provide security service that includes access control, integrality, authentication, replay attack protection, privacy and privacy of finite communication

    過ah和esp協議來以下的安全服務:訪問控,無連接完整性,數據源認證,重放攻擊護,機性和有限的性。
  15. In communications, a cryptographic technique where the sequence of characters or bits is changed by means of a secret transformation

    中的一種加技術。它用轉換的方法改變字元或二進位。同cryptography 。
  16. One important feature of radio signals ’ is that the signals are easy to catch and to disturb. in order to disturb the radio signals, parameters, including code rate, modulation, protocol, protection methods and channel coding, about satellite ’ s signals should be known. so, it is possible to receive the data from satellites and obtain lots of information from it, and even to destroy the undesired information

    衛星系統的遙控遙測息都是過無線道傳遞,而無線電號的一個很重要的特性就是發射易被接收、易被干擾,實現干擾的前提是對衛星號參數的極大了解,這包括明確號的碼速率、調方式、所用協議、措施及道編碼等,因此,過接收衛星數據以獲取大量的未知息,甚至破壞掉對己的不利息就成為可能。
  17. My study involves two areas in quantum key distribution protocol. first, in the field of the b92 protocol, it is first calculated and analyzed for the holevo upper bound of b92 protocol to noise and eavesdropping, the fidelity, a lower bound on the guaranteed privacy and the capacity for classical information over phase flip channels. it is computed and validated for that projective measurements increase quantum entropy

    本文主要涉及兩個方面:一、 b92量子鑰分配協議方面,計算分析了b92協議對噪聲和竊聽的holevo上界,以及過相位翻轉道的真度,道可靠的性量子熵下界和對經典息的容量,計算驗證了定理投影測量增加量子熵,分析了測量前後量子狀態的變化,並用計算機模擬繪了圖形,能夠清楚直觀地分析比較。
  18. Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties

    傳輸層安全協議( tls )和安全套接字層協議( ssl )基於對稱碼技術、非對稱碼技術、消息認證碼技術、公鑰證書和公開鑰基礎設施技術提供了證網路數據的機性、完整性和對各方進行認證的機
  19. The general requirement of communication system and the application potential in secure communication are expatiated. the chaotic secure communication methods home and abroad are also summarized, including chaos spread spectrum communication, chaos key - shifting, chaos parameter modulation, chaos masking, chaos cdma. the exiting problems and development direction are also pointed out respectively

    介紹了混沌學的發展過程和意義,闡述了系統的一般要求和混沌在中的應用潛力,綜述了國內外現有的混沌方法,其中包括:混沌擴頻,混沌鍵控,混沌參數調,混沌掩蓋,混沌數字碼分多址等五大類,指出了各自存在的問題和發展方向。
  20. Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities

    首先對電子政務系統網路的安全進行了分析,其中包括網路的安全風險分析、安全需求分析、安全目標分析,以及電子政務的安全策略分析;然後,從物理安全、訪問控、數據護、安全審計、病毒防護、安全備份和安全管理等方面對電子政務網路安全解決方案進行了分類研究;最後,作為一個研究應用工程實例,過對綿陽市電子政務息網路的風險分析及安全需求分析,對其網路安全的整體解決方案進行了詳細設計。
分享友人