通信保密制 的英文怎麼說
中文拼音 [tōngxìnbǎomìzhì]
通信保密制
英文
secrecy system- 通 : 通量詞(用於動作)
- 保 : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 制 : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
- 通信 : communication; communicate by letter; correspond
-
Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control
文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。It is respectively : production, facility for transporting operates personnel : jockey of lathe work, milling, grinding work, boring labour, solderer, modular machine tool, machining center jockey, casting matchs benchwork, besmear to install ship - fitter of ship - fitter of equipment of benchwork of labour, tool, boiler, electric machinery, discretion to control ship - fitter of appearance of ship - fitter of appearance of instrument of electric equipment ship - fitter, electron, electrical engineering instrument, machine ; irrigation works of aricultural herd fishing produces personnel : inspector of quarantine of the member that animal epidemic disease prevents and cure, animal, firedamp produces work ; personnel of line of business of commerce, service : the member that assistant, bagman, publication is issued, chinese traditional medicine purchase and sale, clerk of the member that the division of division of appraisal appraisal division, chinese style noodle, chinese style noodle, western - style cook division, western - style noodle division, division that move wine, nutrition distributes food, dining - room, antechamber clerk, client clerk, health care ; handle affairs personnel and concerned personnel : secretary, public relations member, the member that terminal of communication of computer operator, cartographer, operator, user is maintained
分別是:生產、運輸設備操作人員:車工、銑工、磨工、鏜工、焊工、組合機床操作工、加工中心操作工、鑄配鉗工、塗裝工、工具鉗工、鍋爐設備裝配工、電機裝配工、高低壓電器裝配工、電子儀器儀表裝配工、電工儀器儀表裝配工、機修鉗工、汽車修理工、摩托車維修工、精密儀器儀表修理工、鍋爐設備安裝工、變電設備安裝工、維修電工、計算機維修工、手工木工、精細木工、音響調音員、貴金屬首飾手工製作工、土石方機械操作工、砌築工、混凝土工、鋼筋工、架子工、防水工、裝飾裝修工、電氣設備安裝工、管工、汽車駕駛員、起重裝卸機械操作工、化學檢驗工、食品檢驗工、紡織纖維檢驗工、貴金屬首飾鉆石檢驗員、防腐蝕工;農林牧漁水利生產人員:動物疫病防治員、動物檢疫檢驗員、沼氣生產工;商業、服務業人員:營業員、推銷員、出版物發行員、中藥購銷員、鑒定估價師、中式面點師、中式面點師、西式烹調師、西式面點師、調酒師、營養配菜員、餐廳服務員、前廳服務員、客戶服務員、保健按摩師、職業指導員、物業指導員、物業治理員、鍋爐操作工、美容師、美發師、攝影師、眼鏡驗光員、眼鏡定配工、家用電子產品維修工、家用電器產品維修工、照相器材維修工、鐘表維修工、辦公設備維修工、保育員、家政服務員、養老護理員;辦事人員和有關人員:秘書、公關員、計算機操作員、制圖員、話務員、用戶通信終端維修員。The effects of the meteor trails orientation on the size and shape of the footprint on the ground are calculated, which the mechanism of good concealment, antijam and low probability of intercept is explained. this method overcomes the classical limitation
其次用數學的方法研究並計算了流星余跡的方位對地面「足跡」的形狀和大小的影響,從而揭示了流星突發通信具有保密性好、抗干擾性、抗攔截的物理機制,克服了經典方法的缺陷。Although the long pn sequence modulation has been used widely in the military communication with the good secrecy performance and restraint of jam between symbols, there is scarcely any research of long pn sequence modulation signals. so it is significant to research the estimation of long pn sequence modulation signals
由於目前尚未有對長pn碼調制信號進行檢測和參數估計的研究,而長碼調制較好的保密性能以及抑制部分符號間干擾的優點,使其在軍事通信中有著較好的應用前景,因而此部分工作具有重要的意義。Traditional laser iff has poor security because of low frequency of laser beam coded pulse. this can be greatly improved when the pulses are modulated by continuous wave laser, but the power of this laser beam output is so low that it ’ s difficult to be detected and received by laser warning subsystem
傳統的激光敵我識別器激光編碼脈沖頻率低,通信保密性差,使用連續波激光器經調制后激光編碼脈沖頻率高,保密性好,但輸出激光功率較低,難以達到激光告警分機探測接收的要求。By using optical cable communication methods, which have advantages of great information transmission capacity, rapid velocity, wide frequency band, strong anti - jamming capability, low circuitry loss and easy construction, modern sky - wave over - the - horizontal radar can achieve information transmission and system control of full coherent radar, which has excellent abilities of security, stabilization, anti - jamming and anti - destruction
通過採用光纖傳輸技術,利用其信息傳輸容量大,速度快,頻帶寬,抗干擾能力強,線路損耗低,易於施工等特點,實現全相參雷達的信息傳輸和系統控制,具有優良的保密性,穩定性、抗干擾性和抗摧毀能力。Information - theoretically secure secret - key agreement is the key to make perfect security. the models of unconditional security from quantum channels and noisy channels are two typical methods now. once the secret - key has been agreed over a public channel, one can use the key to encrypt messages by using one time pad
現在通常的做法是通信雙方使用有擾通道或量子通道建立無條件安全模型,然後在公開認證通道上交互信息進行密鑰協商,通信雙方把協商之後的安全的密鑰作為雙方共享的密鑰使用一次一密體制進行保密通信。Optical attenuation, widely applied in many fields, can be adopted to acquire single - photon sequence that is foundational in quantum key distribution. we obtain single - photon sequence by precisely controlled optical power distribution along outlets of manifold consist of beam splitter instead of the attenuation by time sequence due to loss
用線性分束耦合器形成多個輸出口,將光強的時序衰減變為光強沿輸出口的空間分佈,研製出了量子保密通信用的精密控制的強衰減器,實現了對光子數的精密控制。Based on the analysis of relatively mature network security technology that can be introduced by sip, by the means of improving and applications, the article realizes tls hop - by - hop encryption, s / mime end - to - end encryption mechanism, improved http digest authentication, s / mime end - to - end signature mechanism and so on
在分析現今可以借鑒的用來對sip通信進行保護的相對比較成熟的網路安全技術的基礎上,通過改進和應用,實現了包括tls逐跳加密, s / mime端到端加密等的加密機制以及改進的http摘要認證, s / mime端到端簽名等的身份鑒定機制。Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied
本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算法,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器里,和以idea加密演算法為基礎設計的密碼流發生器( ksg )產生的密碼序列進行加解密運算,並且研究了此加密過程的密碼同步問題。A simple structured chaotic modulation circuit for secure communication system
一種結構簡捷的混沌調制保密通信系統電路Ideal single photon sources are far beyond real application. in practice, single photon sources being used are gained from precisely controlled heavy attenuation. to analyse the security of quantum key distribution system based on practical single photon sources is being very important
單光子是量子保密通信的一大技術關鍵,也是安全的基礎,但是理想的單光子源離實際的使用還很遠,目前實際使用的單光子源是由精密控制的強衰減技術得到的。The algorithm have the good one - way property, high sensitivity to initial values and good security due to the intrinsic characteristic of chaotic system and rijndael algorithm. the simulation experiment demonstrates the convenience and good hash performance ; 3 ) a new scheme of digital voice secure communication was proposed based on chaotic modulation without additional synchronization. the modulation sequence generated by chaotic logical mapping was used to encrypt the digital voice signal
混沌系統和rijndael演算法的固有特點使該演算法具有較好的安全性、對初值有高度的敏感性以及較好的單向性能,並且易於實現,是一種有效的單向hash函數; 3 )研究了一種無需同步的基於混沌調制的數字語音保密通信系統的方案,利用邏輯映射產生混沌調制序列,以該序列作為密碼對數字語音進行加密處理,為了更好的隱匿信號特徵,混沌調制在小波分解的基礎上,對不同的通道使用不同的參數進行,並借鑒混沌掩蓋對信息信號進行了限幅處理,使密文完全隨機化。It can provide security service that includes access control, integrality, authentication, replay attack protection, privacy and privacy of finite communication
通過ah和esp協議來以下的安全服務:訪問控制,無連接完整性,數據源認證,重放攻擊保護,機密性和有限的通信流保密性。In communications, a cryptographic technique where the sequence of characters or bits is changed by means of a secret transformation
通信中的一種加密技術。它用保密轉換的方法改變字元或二進制位。同cryptography 。One important feature of radio signals ’ is that the signals are easy to catch and to disturb. in order to disturb the radio signals, parameters, including code rate, modulation, protocol, protection methods and channel coding, about satellite ’ s signals should be known. so, it is possible to receive the data from satellites and obtain lots of information from it, and even to destroy the undesired information
衛星通信系統的遙控遙測信息都是通過無線通道傳遞,而無線電信號的一個很重要的特性就是發射易被接收、易被干擾,實現干擾的前提是對衛星信號參數的極大了解,這包括明確信號的碼速率、調制方式、所用協議、保密措施及通道編碼等,因此,通過接收衛星數據以獲取大量的未知信息,甚至破壞掉對己的不利信息就成為可能。My study involves two areas in quantum key distribution protocol. first, in the field of the b92 protocol, it is first calculated and analyzed for the holevo upper bound of b92 protocol to noise and eavesdropping, the fidelity, a lower bound on the guaranteed privacy and the capacity for classical information over phase flip channels. it is computed and validated for that projective measurements increase quantum entropy
本文主要涉及兩個方面:一、 b92量子密鑰分配協議方面,計算分析了b92協議對噪聲和竊聽的holevo上界,以及通過相位翻轉通道的通道保真度,通道可靠的保密性量子熵下界和對經典信息的容量,計算驗證了定理投影測量增加量子熵,分析了測量前後量子狀態的變化,並用計算機模擬繪制了圖形,能夠清楚直觀地分析比較。Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties
傳輸層安全協議( tls )和安全套接字層協議( ssl )基於對稱密碼技術、非對稱密碼技術、消息認證碼技術、公鑰證書和公開密鑰基礎設施技術提供了保證網路通信數據的機密性、完整性和對通信各方進行認證的機制。The general requirement of communication system and the application potential in secure communication are expatiated. the chaotic secure communication methods home and abroad are also summarized, including chaos spread spectrum communication, chaos key - shifting, chaos parameter modulation, chaos masking, chaos cdma. the exiting problems and development direction are also pointed out respectively
介紹了混沌學的發展過程和意義,闡述了通信系統的一般要求和混沌在保密通信中的應用潛力,綜述了國內外現有的混沌保密通信方法,其中包括:混沌擴頻通信,混沌鍵控,混沌參數調制,混沌掩蓋,混沌數字碼分多址等五大類,指出了各自存在的問題和發展方向。Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities
首先對電子政務系統網路的安全進行了分析,其中包括網路的安全風險分析、安全需求分析、安全目標分析,以及電子政務的安全策略分析;然後,從物理安全、訪問控制、通信加密、數據保護、安全審計、病毒防護、安全備份和安全管理等方面對電子政務網路安全解決方案進行了分類研究;最後,作為一個研究應用工程實例,通過對綿陽市電子政務信息網路的風險分析及安全需求分析,對其網路安全的整體解決方案進行了詳細設計。分享友人