點到點加密 的英文怎麼說

中文拼音 [diǎndàodiǎnjiā]
點到點加密 英文
mppe
  • : Ⅰ名詞1 (液體的小滴) drop (of liquid) 2 (細小的痕跡) spot; dot; speck 3 (漢字的筆畫「、」)...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  1. Galicia ' s labyrinthine coast, dotted with fishing ports and tourist resorts, is a popular gateway for drug traffickers who want to smuggle cocaine into europe from latin america

    利西亞省迷宮般的海岸線,星羅布的漁港和旅遊勝地。使得這個地方成為毒販們把毒品從拉丁美洲走私歐洲的理想地
  2. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調制器完成對計算機輸出的控制信號處理,將指令碼載送一指定頻率。終端收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達控制用戶通道的管理。
  3. The function of the software use pc - computer to dispose the output signal which is produced by the device as following steps : ( 1 ) to input data by parallel interface ( 2 ) to record and form a file ( 3 ) to demonstrate results step by step ( 4 ) the results could be compiled ( 5 ) it can synthesis in the permitted error scope, substituted original dot for line or arc, finally we could get a graph that is described by some simply curve. ( 6 ) to convert these graph into a program, which used in the cutting process of numerical control. ( 7 ) the software also includes some protective methods

    而系統處理軟體的作用是:利用pc兼容機,將上述裝置的輸出信號( 1 )通過并行口輸入( 2 )記錄成文件( 3 )逐顯示出來( 4 )可人工進行化簡,編輯(刪、改)等( 5 )可在給定誤差范圍內進行人工擬合,用直線和圓弧取代原來的,得一個與原圖形的誤差在規定范圍內,又消除跟蹤過程中因受各種干擾而造成的缺陷,由盡可能少而簡捷的數學曲線描述的圖形( 6 )把這些圖形轉化成用於編制數控線切割工程序及autocad能夠識別的文件(主要指dxf格式) ( 7 )該軟體還有一定的措施。
  4. Coinpe with talihonal analog tnulking system, tetra system is apter to boplemen digltal encrypon of speech and data, but system securiiy is unable to depertd sdriply on enctwon. from the point of view of the b1lbrmation system security arehithebe, the author classified and concltuled the tetra system seeurity and wuced sytw security bo the wts of thnd analysis, security requirements, security sehaces and security mangemen etc. 111e mechbosm of authentication, tem1ina enable and disabq air intn encrypion, end - bend encmption led in tewh is the key ler in this n to the security question of practical application, the re1evant wt w and m are provided too

    但是系統安全不能單純依靠來保證,作者從信息系統安全體系的角度,對tetra系統安全進行了分類歸納,從風險分析、安全需求、安全服務、安全管理等方面對tetra系統安全體系進行了閘述,並對tetra系統中主要應用的鑒權、終端激活禁用、空中介面、端等安個機制進行了重研究,同時針對實際應用中出現的安全性問題提出了解決方法。
  5. After introducing the correlative knowledge of vpn, such as tcp / ip protocols, encryption technology and so on, the article discusses in detail the ipsec protocol and the two main protocols of vpn : pptp and l2tp

    本文在介紹tcp / ip協議、技術等與vpn相關知識的基礎上,較詳細論述了ipsec協議和vpn的兩個主要協議:隧道協議( pptp )和層2隧道協議( l2tp ) 。
  6. Safeguarding information in a secure telecommunication system by cryptographic or protected distribution system means from point of origin to point of destination

    在安全的通訊系統中,從起通過的或安全的分散式系統保護信息的安全措施。
  7. It has little effect on the enhancement of ultimate bearing capacity of frame column that the ratio of the hooped reinforcement in the joint area is increased again after it is up to a certain degree

    區箍筋一定程度再提高配箍率,對框架柱極限承載能力的提高已沒有多大效果。
  8. With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence

    隨著網路技術的迅速發展,網路日益成為人們生活的重要部分,與此同時,黑客頻頻入侵網路,網路安全問題成為人們關注的焦,傳統安全方法是採用盡可能多的禁止策略來進行防禦。目前採用的手段有防火墻、、身份認證、訪問控制、安全操作系統等,這些對系統非法入侵都起一定的作用。然而從系統安全管理角度來說,僅有防禦是不夠的,還應採取主動策略。
  9. This paper detailedly describe my work in the research of pki, mainly include to independently develope a certificate function library that suitable for multi - platform and to establish a fundamental pki framework based on this library. the innovation of this paper is to implement multiform certificate process functions in the certificate function library, support the process of multiform certificate format including x. 509v3 certificate using in internet and wtls certificate using in wireless, and meanwhile provide multiform apis that can make this library used in different applications as a functional component

    本文的創新是在證書功能庫中實現了多種的證書處理功能,如產生和驗證證書請求、產生和驗證證書、對私鑰進行存儲和證書撤消等功能,支持多種證書格式的處理包括適用於因特網的x . 509v3證書格式和適用於無線領域的wtls證書格式,提供了多種api介面,使該功能庫可以作為一個功能組件嵌入不同的應用中。
  10. In this thesis, the basic problem of network security, some correlative protocols and cryptology are discussed at first, math theory in point is also studied. especially, a sort of new matrix method of solving quadratic equation over gf ( 2m ) is given, which is the key of selecting random point over elliptic curves. no better solution has been found in related literature in the world. compared with ieee p1363 ' s method, it is easy to implement the software and obtain high efficiency, etc. then the basic operation of elliptic curve is debated and the steps of finding secure curve and basis point over gf ( 2m ) are presented. moreover, the encryption and decryption schemes of the ecc are designed and the security problem of ecc is also considered. in the end, ecc by koblitz curves are implemented

    文章首先討論了網路安全基本問題、網路安全協議和碼學;對相關數學理論進行了研究,特別是給出了一種新的求解gf ( 2 ~ m )上二次方程的矩陣法,而它是選取橢圓曲線上的隨機的關鍵步驟,和ieeep1363的方法相比,它有易於軟體實現、效率高等優,在國內外相關文獻上還未見更好的求解方法;接著討論了橢圓曲線的基本運算,進而給出了在gf ( 2 ~ m )上選取安全曲線及基的步驟;文章還設計了橢圓曲線系統的方案,討論了橢圓曲線系統的安全性問題。最後文章就koblitz曲線系統進行了軟體實現。
  11. The main process of the method is : after the converged solution for a certain layer of grid is obtained, all elements that are required to be refined based on error analysis are automatically found and output. as the distribution of the elements to be refined is often discrete and irregular, regular square blocks consisting of elements to be refined need to be manually built and input to the computer. the computation for the refined layer grid is then carried out and the procedure is repeated until the final convergence criterion is satisfied

    該方法的特是:當某一層次網格取得收斂解后,程序根據誤差分析自動判別並輸出該層次網格內需的單元,由於需單元的分佈一般較為離散和不規則,因此通過人工介入對這些單元進行組塊並輸入計算機,程序便開始進行下一層次網格的迭代計算,直至得滿足最終收斂判據的解。
  12. With the fast development of internet, the problem of information security looks increasingly important. then on the basis of safe and high efficient encryption algorithm, some related network protocols are produced. compared with some other public key cryptosystems, elliptic curve cryptosystem ( ecc ) has many merits, so the special attention is paid to it by the network safety specialist in the world. ecc is widely argued because of no standard source code. in this article, the research is on the ecc theory and the implementation of it is also done

    隨著網際網路的快速發展,信息安全問題顯得日益重要。相關網路安全協議應運而生,而它們的基礎都是安全高效的演算法,橢圓曲線系統與其他公鑰系統相比有許多優,受國內外安全專家的極大關注。可是橢圓曲線系統( ecc )並無公開的標準源代碼,還處于「百花齊放,百家爭鳴」的局面,文章對于安全的橢圓曲線系統做了理論研究和實現工作。
  13. Automated fingerprint identification system ( afis ), a technology of fingerprint identification using computer, is of convenience high fields efficiency, security and reliability. it has been applied in many such as financial security, data encryption, electronically business and will play a more and more important role in our life

    自動指紋識別系統是基於計算機來進行指紋識別的技術,具有方便、高效、安全、可靠等優,在金融安全、數據、電子商務等各個領域都得了廣泛的應用,並將在我們的生產和生活中發揮越來越重要的作用。
  14. Because of the properties of asymmetric key encryption technology, the recipient can then verify that the message was really from the sender by using the sender s public key because it is publicly available to verify the message digest for example,

    因為非對稱技術的特,接收方可以使用發送方的公開鑰(因為可以公開得)驗證消息摘要(比如,
  15. Labor intensive industries adapting to local situation should be developed and enhanced, such as township enterprises, for providing off - farm opportunities to on - spot labor transferring, along with the rural industrialization and urbanization. at the same time, relevant departments should pay more attention on human resources investment, through enhancing farmers education and their quality for improving the capacities of farmers to choose and find jobs. another important solution is to organize the labor transferring, from transferring without plan and purposes to transferring with confirmed purposes, to increase the transferring efficient and transferring ratio

    在以上分析的基礎上,提出本文的建議:應該大力發展和鞏固適應農村特的勞動集型二、三產業,尤其是鄉鎮企業,在推進農村工業化和城鎮化的同時,增大量非農就業機會,促進勞動力的就地轉移;同時,從人力資本投資角度出發,通過多種多樣的形式,強農民的教育,逐步提高農民的素質,幫助他們掌握一技之長,增強農村勞動力自主擇業和從業的能力;同樣重要的是,強農村勞動力轉移的組織,從嘗試盲目的轉移有目的的轉移,提高農村勞動力的轉移效率,從而促進轉移比例的提高;對于不同的社區,推進勞動力轉移的進程中,要注意對一些特殊群體? ?比如女性勞動力的轉移採取一系列的促進工作。
  16. Based on the svs characteristic analysis of image matrix, a visually recognizable binary image watermark is embedded into maximal singular value coefficient in block - based svd transform domain of the cover image. here we brought forward two primary schemes : one need original signal and the other is blind ( without the original cover ). experimental results show that our schemes can extract reliable copy of the hidden watermark from images that have been significantly degraded or altered through several common geometric distortions and signal processing operations

    本文基於圖像矩陣的svd奇異值分解特性分析,提出了在新的svd變換域中進行的數字水印演算法,水印信息嵌入分塊變換的最大奇異值分量系數中,應用混沌變換和空域置換,改善了空域性能,安全性高;利用圖像分塊矩陣的奇異值分解穩定性好的特,採用圖像內容自適應方法計算水印的嵌入強度,增強了演算法的穩健性;採用二值圖像作為有意義水印進行嵌入和檢測,水印在感知上是可視的。
  17. The additional operation to pad 0 or 1 to the beginning of the message blocks makes the length extension attack not to be work. the method to construct the encryption block based on aes makes the algorithm stay safe under the differential cryptanalysis. the secure domain extension method makes it resist on the multi - collision attack

    演算法附的填充操作使它能抵抗長度擴展攻擊、所採用的基於aes的模塊使它能抵抗差分分析、採用的安全的域擴展使它能抵抗多沖突攻擊、採用的安全pgv方案使它能有效抵抗固定攻擊;總體上,它能達
  18. In this paper, author consider the combination of theory with practice especially. in the process of study, the avo method technology and technology of seismic data process and the study of interpretation were combined. on the basis of extensive absorbing the advance technology inside and outside, the theory of generalized linear inversion avo and non - linear avo inversion and weighted stacking technology were discussed detailed to the characteristic of heterogeneous reservoir. then, the forward and inversion of those methods were performed

    在本文的研究中, avo方法技術與地震資料處理及解釋研究得了緊地結合,在廣泛吸取國內外avo油氣檢測先進技術的基礎上,針對非均質氣藏特的需要,文章詳細論述了廣義線性avo反演方法和非線性avo反演方法、 avo反演中的權疊技術的方法原理,並對上述方法分別進行了詳細的模型的正演和反演的研究。
  19. Although encrypted optical holographic storage such as double random phase encoding and encrypted orthogonal phase encoding have been validated to be correct, but they can apply only one pace of encryption, which can not meet the need of encrypting the very inportant informations

    雖然光全息技術如雙隨機相位編碼和正交相位編碼技術在理論和實驗上都已得驗證,但它們都有一個缺就是只能對數據進行一重。這對于保一些非常重要的信息是不能滿足需求的。
  20. End - to - end encryption methodology is adopted to ensure data security and secrecy in the course of transmission to ird.

    有關系統採用技術,以確保資料在傳送稅務局途中的安全和保
分享友人