電算加密 的英文怎麼說

中文拼音 [diànsuànjiā]
電算加密 英文
analytical aerotriangulation
  • : Ⅰ名詞1 (有電荷存在和電荷變化的現象) electricity 2 (電報) telegram; cable Ⅱ動詞1 (觸電) give...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 電算 : cpe
  1. We have calculated one - and two - photon absorption cross sections of the lowest excited states of a series of molecules combined with benzene, stilben, thiophene as center attached with amine, diphenylamine, diethylamine as electron - donor and nitryl as electron - acceptor ; the effects of molecular length, n center and electron - donor on two - photon absorption cross sections have been studied and all calculations have been carried out using the density functional theory at an ab initio level. it is found that the molecular length and the one - photon absorption intensity are quite strongly c orrelated factors, and that a corresponding correlation for the two - photon absorption is decreasing. it is also found that a most crucial role for the two - photon absorption is played by the n center

    我們分別以苯、二苯乙烯、噻吩為中心,氨基、二苯氨基和二乙氨基為子給體,硝基為子受體組合形成的分子為研究對象,在從頭計的水平上用度泛函理論計了這些分子在低激發態下的單、雙光子吸收強度,重點研究了分子的長度、中心和給體的供子能力對分子單、雙光子吸收的影響。研究結果表明,分子長度與單光子吸收強度之間有切關系,而在雙光子吸收中這種關系較弱;中心在雙光子吸收中具有重要的作用;在中心和受體一定的情況下,增給體的供子能力,可提高雙光子吸收強度。
  2. Wireless communications are easy targets for air wave interception, and wireless devices rarely have the computing power to support strong encryption of all communication data

    無線通信是無線波攔截容易獲取的目標,而無線設備幾乎沒有任何計能力來支持所有通信數據的強
  3. Having been studied and analyzed by cryptologist for over 10 years all over the world, pgp algorithm has been regarded as of security, high efficiency and operability. consequently, series of pgp ' s standard for application to protect e - mail came out. now a great deal of pgp ' s commercial software or free software has been developed

    經過十多年世界范圍的應用研究和碼分析家們的分析, pgp被認為是安全、高效和易於實現的法,形成了應用於保護子郵件的一系列標準,並且有相當多的商業軟體和免費軟體被相繼開發。
  4. When performed the cryptographic computation, the smart card will leak information, namely timing of operations, power consumptions, electromagnetic emissions, etc. power analysis attacks use this information to break the secret key

    晶元在執行時硬體本身會泄露一些信息,如能量消耗、磁輻射等。能量分析攻擊利用此信息進行分析,便可獲得和碼相關的一些有用信息。
  5. The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient

    數字包裝器最被認可的形式是數字信封,這些代碼主要完成子郵件的,把想打開信封而沒有正確數字鑰的入侵者擋在外面,數字信封主要由通過或軟體演的代碼組成,運載著能正確讓接收方識別發送方身份的數字簽名。
  6. In the application of pmos - 2000 system, the author carried out a hybrid encryption protocol with is suitable for information security transmission in electricity market with des, rsa and md5. with the pattern characteristics of pmos - 2000 power market operator system, and analyzed and compared with other encryption system, the author puts forward an implementing method, operational process and system structure of information encryption technology used in pmos - 2000, and the operating effects and projects which need further research and discussion were finally given. the research of this dissertation applied information security technology in power system project, which made it possible for information security transmission

    在pmos ? 2000系統的應用中,作者利用des對稱法、 rsa非對稱法、 md5數字簽名演法實現了一套適合力市場信息安全傳輸的混合體制,結合了pmos ? 2000發市場技術支持系統的模式特點,通過與別的體制的分析比較,把混合體制應用於pmos ? 2000系統之上,並提出了這套系統在pmos ? 2000力市場技術支持系統中的實現方法、運作過程和系統體系結構,最後給出了它的運行效果以及進一步可研究和探討的方案。
  7. By the algorithm, we can make our life more automatical. encryption techniques of digital images are very practical and crucial techniques. this thesis makes a depth research on these two fields, and its major contributions are as follows : 1st

    數字圖像技術是隨著計機網路多媒體技術和現代子商務的不斷發展,在機要、軍事、政府、金融和私人通信等領域中逐漸形成的一項非常實用又亟待快速發展的關鍵技術。
  8. Further analyses are given to some important parts of the secure email system, such as digital signature, encryption and decryption. the author also describes in detail how to realize them. in the third part, it is proposed to use ldap server for distribution of the certificates and use sasl authentication in secure email system to ensure information security

    對適于安全子郵件的演法從hash 、簽名到、認證進行了比較分析;二是根據s mime協議提出了安全郵件系統的體系結構,對其重要的數字簽名、和解部分作進一步的分析,給出了具體實現步驟並進行了實現;三是基於ldap協議設計了用戶證書和通信簿管理體系,建立了ldap服務器客戶端數字認證模型,並進行了實現。
  9. The two - dimensional axisymmetric subsonic - transonic - supersonic flow in an experimental arcjet thruster is simulated numerically using flux vector splitting method. the profiles of density, velocity, temperature, pressure and mach number can be obtained by the computation. the computation grid and some computed results are given here. the test equipment such as power supply system, ignition system, propellant supply system, arcjet thruster, thrust measuring device and vacuum system are introduced briefly. some working phenomena of the arcjet are observed and discussed. three different kinds of instability appeared in the process of the experiments. except some important parameters are measured, it is found that the operating stability of argon is better than that of nitrogen

    對一實驗熱式發動機二維軸對稱亞跨超音速流動進行了數值模擬,所採用的方法是矢通量分裂演法.通過計可以得出度、速度、溫度、壓力和馬赫數的分佈.給出了計所使用的網格和一些計結果.簡要介紹了實驗所使用的設備,如源系統、點火系統、推進劑供給系統、熱式發動機、推力測量裝置和真空系統.對所觀察到的一些工作現象進行了討論.有三種不同的不穩定性出現于實驗過程.除了所測量的一些重要參數,通過實驗發現氬比氮工作更穩定
  10. It particularly analyzes the encryption algorithms to choose a perfect frame, and makes good use of the advantages of rsa algorithm and des algorithm, so that the whole system obtains a credible guarantee of its security

    進行了詳細的演法研究及選型,合理運用了rsa和des演法的優勢互補,從而為整個應用系統提供了可靠的安全性保障。論文完成了信息系統的軟體演法的詳細設計和硬體路的搭建。
  11. Chapter 2 describes all aspects of conditional access systen in dvb architecture including struct, principium, encrypt arithmetic, dvb simulcrypt and common interface

    第二章在dvb規范下論述了數字視條件接收系統的結構和原理、法、 dvb同規范和通用介面規范。
  12. Iso10126 - 2 - 92 banking. procedures for message encipherment wholesale. part 2 : dea algorithm

    銀行業務.大宗程序.第2部分: dea演
  13. The relevant program of both the dongle and the computer have also been developmented. a parallel port and a serial port are provided for the pcb. there is a program ( in vhdl, vhsic hardware description language ) carrying out in the pld which implementi ng the parallel protocol. an encrpt arithmetic is designed and embeded in pld. to providing a interface for the user, a dll ( dynamic link library ) is developmented in c + + builder

    所設計的路板上可以選擇連接串列口或者并行口,在pld內用vhdl ( vhsichardwaredescriptionlanguage ,硬體描述語言)實現了並口的通信協議和一個自行研製的碼演法,並在c + + builder環境下開發了配套的上位機軟體,主要是提供了dll (動態鏈接庫)和一些函數用於pc機和鎖之間進行通信。
  14. Through combining the simultaneous ot protocol and the encrypted circuit construction, obtain a non - interactive secure function evaluation protocol

    組合該並發ot協議與路構造,得到一個非交互保函數計協議。
  15. Automated fingerprint identification system ( afis ), a technology of fingerprint identification using computer, is of convenience high fields efficiency, security and reliability. it has been applied in many such as financial security, data encryption, electronically business and will play a more and more important role in our life

    自動指紋識別系統是基於計機來進行指紋識別的技術,具有方便、高效、安全、可靠等優點,在金融安全、數據子商務等各個領域都得到了廣泛的應用,並將在我們的生產和生活中發揮越來越重要的作用。
  16. Pgp ( pretty good privacy ) is popular cipher algorithm applied to protect e - mail nowadays in the world

    Pgp ( prettygoodprivacy )是當前世界流行的用於保護子郵件的法。
  17. During the last 10 years, with the acquisition of much valuable intensive observations in a series of typhoon field experiments, the improvement of the weather monitoring network, the upgrade of atmospheric numerical models and the rapid development of computer powers, many problems in typhoon heavy rainfall research are further studied, such as the interaction between typhoons and mid - latitude weather systems, the interaction between typhoons and topography and underlying surface, the mesoscales of typhoons and the dynamics and so on

    近10年來,隨著我國一系列臺風外場科學試驗觀測數據的獲得、天氣監測網的逐步完善、大氣模式的改進以及子計機的飛速發展,臺風與中緯度系統的相互作用、臺風與地形下墊面相互作用、臺風中小尺度及其動力學等方面均得到深入研究。
  18. The research in software radio is not more than ten years, but has made a great many fruits, but it is too little to set up an integrated theory system, and software radio includes many areas such as modern communication system ( which includes modem source / channel encoding and decoding, equalization, encrypt and decrypt and so on ), wideband antenna theory, digital signal process, microelectronics, computer and so on. this thesis mainly does research for modem in modem communication

    軟體無線經過不到10年的研究,盡管取得了很多成果,但是對于建立一套完整的理論體系來說,還遠遠不夠,況且軟體無線涉及的領域多、面廣、發展快,如現代通信理論(含調制解調、信源通道編解碼、均衡、等) 、寬帶天線理論、數字信號處理、微子、計機等。
  19. In this paper, against so many kinds of hazards in e - mail application, not changing the e - mail protocols in existence, we embed a good encryption algorithm, permutation code in the system to safeguard the information of e - mail, introduce public - key cipher to implement transfer of session keys safely, implement authentication and integrity of information, and introduce essential key management mechanism

    本文針對子郵件面臨的種種安全威脅,在不改變現有子郵件協議的前提下,嵌入性能良好的排列碼法來保障郵件信息的安全,同時採用公鑰碼體制來保障鑰的安全傳遞,並實現消息的身份認證及數據完整性;還引入了必要的鑰管理機制。
  20. Finally, the paper systematically study the problem of how to apply modern cryptography to system of secure electronic transaction, and bring forward an idea of combination of selective multi - algorithm of encrypting and decrypting, accomplish the design of the security mechanism and the comprehensive model of encryption applied to system of secure electronic

    最後系統地研究了如何將現代碼學技術應用到子交易系統中的問題,提出了一種多演法可選擇的組合思想,完成了子交易系統的安全機制和系統模型的綜合設計。
分享友人