電信加密 的英文怎麼說

中文拼音 [diànxìnjiā]
電信加密 英文
telecipher
  • : Ⅰ名詞1 (有電荷存在和電荷變化的現象) electricity 2 (電報) telegram; cable Ⅱ動詞1 (觸電) give...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 電信 : electric(al) communication; telecommunication; telegraphy; traffic; telecom電信電纜 communicati...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據訊的機性和完整性、數據訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了子提單的安全認證機構,第五章介紹了技術以及各國立法對碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據訊制度產生的必然性;第八章通過對各國立法對子證據的法律效力的規定,論述了對子交易至關重要的數據訊的不可抵賴性。
  2. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業息集成平臺中子文檔安全存儲要求,採用和壓縮技術,將子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業子文檔進行集成的、統一的管理,提出一種訪問控制的增強型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全訪問機制,用以提高系統的訪問安全性,並大大減少授權管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、訪問和檢索子文檔的方法,使得企業息集成平臺的子文檔獲得安全、可靠、快速的訪問。
  3. Wireless communications are easy targets for air wave interception, and wireless devices rarely have the computing power to support strong encryption of all communication data

    無線通是無線波攔截容易獲取的目標,而無線設備幾乎沒有任何計算能力來支持所有通數據的強
  4. Digital certificates bind owners to a pair of electronic keys that can be used to encrypt and sign information, assuring that the keys actually belong to the person or organization specified

    數字證明把擁有者與一對能用於對和簽名的子鑰匙捆綁在一起,保證了這對鑰匙真正屬于指定的個人或機構。
  5. When performed the cryptographic computation, the smart card will leak information, namely timing of operations, power consumptions, electromagnetic emissions, etc. power analysis attacks use this information to break the secret key

    晶元在執行運算時硬體本身會泄露一些息,如能量消耗、磁輻射等。能量分析攻擊利用此息進行分析,便可獲得和碼相關的一些有用息。
  6. To send encrypted electronic messages to the subscriber organisation

    傳送息予登記人機構;
  7. The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient

    數字包裝器最被認可的形式是數字封,這些代碼主要完成子郵件的,把想打開封而沒有正確數字鑰的入侵者擋在外面,數字封主要由通過或軟體演算法的代碼組成,運載著能正確讓接收方識別發送方身份的數字簽名。
  8. In the application of pmos - 2000 system, the author carried out a hybrid encryption protocol with is suitable for information security transmission in electricity market with des, rsa and md5. with the pattern characteristics of pmos - 2000 power market operator system, and analyzed and compared with other encryption system, the author puts forward an implementing method, operational process and system structure of information encryption technology used in pmos - 2000, and the operating effects and projects which need further research and discussion were finally given. the research of this dissertation applied information security technology in power system project, which made it possible for information security transmission

    在pmos ? 2000系統的應用中,作者利用des對稱演算法、 rsa非對稱演算法、 md5數字簽名演算法實現了一套適合力市場息安全傳輸的混合體制,結合了pmos ? 2000發市場技術支持系統的模式特點,通過與別的體制的分析比較,把混合體制應用於pmos ? 2000系統之上,並提出了這套系統在pmos ? 2000力市場技術支持系統中的實現方法、運作過程和系統體系結構,最後給出了它的運行效果以及進一步可研究和探討的方案。
  9. By the algorithm, we can make our life more automatical. encryption techniques of digital images are very practical and crucial techniques. this thesis makes a depth research on these two fields, and its major contributions are as follows : 1st

    數字圖像技術是隨著計算機網路多媒體技術和現代子商務的不斷發展,在機要、軍事、政府、金融和私人通等領域中逐漸形成的一項非常實用又亟待快速發展的關鍵技術。
  10. W is a digiul trunkin mobile cominunhaon system based on mma forhnology it offers group call diw w m wion ( dmo ), duplex phone tall, padri data sehece, short data service and so on. tetw supports air interface and end - bend encrypon. tem is not only a fit private system for dispateh cominedcation of the polieq fire servce " w ha wtport, city tiwhc eto, but also for ule project reqthements of the public tw communication system

    Tetra是一種基於時分復用( tdma )技術的數字集群移動通系統,它可以提供組呼調度、脫網直通( dmo ) 、企雙工話、分組數據服務、數據簡訊息服務等業務,支持空中介面和端到端功能,既適合公安、消防、機場、鐵路、城市交通管理等專業部門調度指揮專用,也可滿足社會共用集群網的設計要求。
  11. We also believe that the software addresses the following requirements : experience in the china marketplace ; real time transactions ; ease of use ; reliable and detailed account information ; system expandability ; internet based ; where no bank / credit card is available, payment can be made when client deposits money with a financial institution which holds the money for the client ( knows as an electronic purse ) ; transactions and transaction data be encrypted with the state - of - the - art network security technology ; free registration ; low cost of transaction ; and on - going technical assistance and support

    我們也相該軟體滿足以下要求:在中國市場的經驗;實時交易;使用簡單;可靠和詳細帳戶息;系統擴展性;基於網際網路;無銀行和用卡可用的地方,當顧客存款到擁有顧客資金的金融機構(了解作為子錢包) ,支付可以進行;交易和交易數據可以被藝術級的網路安全技術;免費注冊;交易低成本;和正在進行的技術援助的支持。
  12. Further analyses are given to some important parts of the secure email system, such as digital signature, encryption and decryption. the author also describes in detail how to realize them. in the third part, it is proposed to use ldap server for distribution of the certificates and use sasl authentication in secure email system to ensure information security

    對適于安全子郵件的演算法從hash 、簽名到、認證進行了比較分析;二是根據s mime協議提出了安全郵件系統的體系結構,對其重要的數字簽名、和解部分作進一步的分析,給出了具體實現步驟並進行了實現;三是基於ldap協議設計了用戶證書和通簿管理體系,建立了ldap服務器客戶端數字認證模型,並進行了實現。
  13. For example, digital signature, identity distinguish are both the new technology and application derived from the cryptography. ecc is the one of the known public crypto methods that provide the best strength - per - bit. with the deeper application of ic card in the field of finance and telecom, the ecc crypto system will not only upgrade the application level of ic card, but also open up more application fields

    橢圓曲線碼體制( ellipticcurvecryptosystem ? ecc )是目前已知的所有公鑰碼體制中能夠提供最高比特強度( strength - per - bit )的一種公鑰體制,而智能卡已廣泛用於金融、等領域,利用橢圓曲線碼體制不僅將大大提高智能卡的應用水平而且還將大大拓寬智能卡的應用領域。
  14. It is found from the monitoring data that the response of the acceleration transducer is linearly relative to the compaction degree of gravel soils

    在大量室內試驗數據的基礎上,研究了振動壓實過程中速度號響應隨碎石土實度的變化規律,發現二者具有顯著的線性相關性。
  15. In this article, two projects - " sqy - 15 encrypt subsystem of hospitalization insurance system " and " general image compress flatform " are combined to get a resolvent scheme to realize data encrypt and image compress based on digital signal processor ( dsp ) and application specific integrated circuits ( asic ). this article includes three key technologies in designing and realizing the data encrypt card and the image compress flatform. they are : ( 1 ) design of dsp application system ; ( 2 ) epld designing technology using vhdl language ; ( 3 ) pci interface technology

    本文結合「 sqy - 15醫療保險息系統子系統」和「通用圖像壓縮平臺」兩項目,提出了基於數字號處理器( dsp )和可編程專用集成路( asic )實現數據卡和圖像壓縮平臺的解決方案,重點介紹了基於dsp的數據卡和圖像壓縮平臺設計與實現中的三個關鍵技術: ( 1 ) dsp應用系統設計; ( 2 ) vhdl語言設計epld技術; ( 3 ) pci介面技術。
  16. It particularly analyzes the encryption algorithms to choose a perfect frame, and makes good use of the advantages of rsa algorithm and des algorithm, so that the whole system obtains a credible guarantee of its security

    進行了詳細的演算法研究及選型,合理運用了rsa和des演算法的優勢互補,從而為整個應用系統提供了可靠的安全性保障。論文完成了系統的軟體演算法的詳細設計和硬體路的搭建。
  17. In order to enhance the teaching effect, we have developed the network firewall, the data encryption and the email encryption system, the network monitor and control system. the students not only may operate and configure these systems actually, also carry on the network attack and defense, and obtain the experience, grasp the information security elementary knowledge, the elementary operation and the basic config method

    為提高教學效果,開發了與息安全實驗相關的網路攻擊、網路防火墻、數據子郵件、網路監控等子系統,不但可以由學生實際操作、配置進行網路攻防,使學生可以在此虛擬實驗環境中獲得相關的知識和實際動手操作的經驗,掌握息安全基礎知識、基本操作、基本配置。
  18. We use the eway secure payment gateway to accept credit card payments. details of your credit card are protected by 1024 bit encryption and payments are processed in real time

    -我們使用eway安全付款門戶,所有用卡資料均經過128 bit ssl,並實時轉送用卡中心及銀行的腦系統。
  19. The relevant program of both the dongle and the computer have also been developmented. a parallel port and a serial port are provided for the pcb. there is a program ( in vhdl, vhsic hardware description language ) carrying out in the pld which implementi ng the parallel protocol. an encrpt arithmetic is designed and embeded in pld. to providing a interface for the user, a dll ( dynamic link library ) is developmented in c + + builder

    所設計的路板上可以選擇連接串列口或者并行口,在pld內用vhdl ( vhsichardwaredescriptionlanguage ,硬體描述語言)實現了並口的通協議和一個自行研製的碼演算法,並在c + + builder環境下開發了配套的上位機軟體,主要是提供了dll (動態鏈接庫)和一些函數用於pc機和鎖之間進行通
  20. Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities

    首先對子政務系統網路的安全進行了分析,其中包括網路的安全風險分析、安全需求分析、安全目標分析,以及子政務的安全策略分析;然後,從物理安全、訪問控制、通、數據保護、安全審計、病毒防護、安全備份和安全管理等方面對子政務網路安全解決方案進行了分類研究;最後,作為一個研究應用工程實例,通過對綿陽市子政務息網路的風險分析及安全需求分析,對其網路安全的整體解決方案進行了詳細設計。
分享友人