鏈路加密 的英文怎麼說

中文拼音 [liànjiā]
鏈路加密 英文
link encryption
  • : Ⅰ名詞1. (鏈子) chain Ⅱ動詞(用鏈栓住) chain; enchain Ⅲ量詞(計量海洋上距離的長度單位) cable length
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 鏈路 : chain circuit; periodic line; link; link circuit; path of chain
  1. As to the high - density polyethylene, two strategies were performed : ( 1 ) after being modified by grafting polar groups on its backbone, polyethylene and organic montmorillonite were melt mixed directly, which could obtain the polyethylene / montmorillonite nanocomposites. the effect of groups grafted on the backbone on the efficiency of intercalation was investigated in this paper ; ( 2 ) choosing the grafters obtained in this experiment as the compatilizers, polyethylene / montmorillonite nanocomposites had also been prepared by melt mixing the polyethylene, grafter and organic montmorillonite. the difference of grafters and sequence of mixing on the intercalation result had also been analyzed

    對于高度聚乙烯,採用以下兩種思進行: ( 1 )對聚乙烯首先進行功能化改性,使聚乙烯分子上接枝上不同的極性基團,將改性后的聚乙烯再同有機蒙脫土直接熔融復合,成功的制備了聚乙烯蒙脫土納米復合材料,並考察了接枝到聚乙烯主上基團的不同對最終插層效果的影響; ( 2 )選用制得的接枝物作為相容劑,將聚乙烯,接枝物,有機蒙脫土三者熔融復合,也可以得到聚乙烯蒙脫土納米復合材料,並對選用不同的接枝物作為相容劑以及復合順序對最終插層效果的影響以分析。
  2. ( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system

    特別是,論文作者在網安全系統建設的過程中,獨立承擔了中心子網防火墻、網入侵檢測系統、病毒防護體系的安裝及管理工作,在詳細了解了ddn鏈路加密、 pki ca體系的建設和使用原理的基礎上,參與了網基礎設施的安裝調試以及各類服務器的配置管理,擬定了《計算機信息系統安全管理規定》 、 《網ip地址規范》 ,為本單位網安全建設規劃提出了意見和建議。
  3. After the investigation of the general technology of hardware implementation, how to implement the kasumi algorithm using field programmable gate array ( fpga ) device is discussed in detail, and the author develops the cipher chip of kasumi algorithm, the kasumi cipher card based on 32 - bits pci bus, the wdm device driver that used in windows2000 / xp, and the software to demostrate encrypting data link. finally, an application demostration is constructed with all the above implementation

    在此硬體實現的結果晶元基礎上,設計了32位的基於pci總線的kasumi卡,編寫了windows2000 xp下的windows驅動程序模型( wdm )驅動程序和鏈路加密應用程序,由此構成一個應用演示系統,作為研製結果的應用評估,為進一步進行第三代移動通信系統相關安全技術研究和開發提供了基礎條件。
  4. Parts easy to attack in the system are lan and communication link, which need to take link encrypting and point - to - point encrypting

    系統易受攻擊的環節是局域網與通信,需採取鏈路加密和端到端措施。
  5. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理、干擾情況、網拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網安全結構模型;最後給出了各種技術的基本理論,包括對稱體制如des和blowfish 、非對稱體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級標準( advancedencryptionstandard , aes )等。
  6. Because packet encryption devices do not require a one - to - one relationship with the links or circuits they encrypt, network managers can more readily implement redundant devices to avoid a single point of failure

    由於包裝置不需要與它們或線有一對一的關系,所以網管理員可以更容易地設置冗餘裝置,以避免單一點的失效。
  7. This means that all network links are unencrypted and unauthenticated

    這意味著所有網接都是不和不經過身份驗證的。
  8. The initialisation key is the first security gate in bluetooth security system, if the initialisation key is got by attacker, the attacker will get the common link key by continue listening the communication. if the common link key is known by others, the two device is no secret before he. the third party can not only listen the two device ' s communication but also assert him one party to authenticate the other. pairing at place where less people here will reduce the attack. to use long pin managed by diffie - hellman key exchange algorithm will also reduce the attack

    初始字是藍牙安全系統的第一道安全屏障,如果初始字被攻擊者得到,攻擊者就可以通過監聽兩設備的后續通訊進而獲得兩設備的公共字,如果兩設備的公共字為第三方知曉,那麼兩設備對于第三方面而言就毫無安全性可言。第三方不但可以偷聽兩設備的通訊,還可以冒充其中一方向另一方鑒權。
  9. The relevant program of both the dongle and the computer have also been developmented. a parallel port and a serial port are provided for the pcb. there is a program ( in vhdl, vhsic hardware description language ) carrying out in the pld which implementi ng the parallel protocol. an encrpt arithmetic is designed and embeded in pld. to providing a interface for the user, a dll ( dynamic link library ) is developmented in c + + builder

    所設計的電板上可以選擇連接串列口或者并行口,在pld內用vhdl ( vhsichardwaredescriptionlanguage ,硬體描述語言)實現了並口的通信協議和一個自行研製的碼演算法,並在c + + builder環境下開發了配套的上位機軟體,主要是提供了dll (動態接庫)和一些函數用於pc機和鎖之間進行通信。
  10. This paper first introduce the new technology bluetooth, then discuss the security of bluetooth at link layer including the management of link key ( classify 、 generate and transfer ) 、 pairing 、 authentication and encryption. at last discuss the security hole in bluetooth such as initialization key 、 unit key 、 authentication and bluetooth device address and the methods to solve the problem

    文中首先簡要介紹了藍牙這一新技術;接著討論了藍牙層的安全問題,包括字的管理(分類、生成及傳遞) 、配對過程、鑒權過程和過程。
  11. In order to get high quality voice in spite of low - bandwidth, our system uses several kinds of voice compression algorithms, and it realizes the functions of voice activation and jitter compensation. on the other hand, we use some methods to make voice communication safe. the methods includes : filling traffic, encrypting voice datagram with conventional encryption algorithms ; encrypting session key with asymmetric encryption, multiple authentication

    為了保證通信不被分析,系統實現了一個通信量填充器;為了對傳輸中的語音數據包進行,系統提供了des 、 idea 、 blowfish和keyfile等各種常規方法;為了利用對稱的快速性和公開的方便性,系統只對會話鑰進行公開
  12. The globalization of business also should boost the popularity of packet encryption because it allows a variety of different algorithms to be used for domestic and offshore links

    業務的全球化也應快包的流行,因為包允許使用各種不同的演算法用於國內和海外的
  13. Unlike link encryption, where one key is applied to all data traversing a given connection, packet encryption allows keys to be applied selectively to designated packets

    鏈路加密不同,一個在了給定連接上通過的所有數據,而包可使多個鑰有選擇地在指定的包上。
  14. In chapter 2, the security measures and mechanism are introduced and studied. it mainly includes authentication, encryption, pairing / bonding, key management defined by bluetooth core protocol, three security modes defined by bluetooth profile and bluetooth security architecture defined by bluetooth white paper. in chapter 3, the implementation of secure services in bluetooth environment is studied deeply according to different scenarios

    在第二部分,本文闡述了藍牙技術中的安全機制和各種具體措施,主要包括藍牙標準對直接層的安全標準定義如鑒權、、配對/ bonding 、鑰管理等,藍牙應用規范中給出的三種安全模式以及藍牙安全標準白皮書的安全體系結構。
  15. Freedom from synchronization issues also is important in case of dropped connections. while intermittent network problems can seriously disrupt link encryption, packet - encryption devices can tolerate temporary signal loss

    萬一連接中斷時,不依賴于同步的問題也是很重要,間歇性的網問題可以嚴重地破壞鏈路加密,而包裝置可以容忍暫時的信號丟失。
分享友人