cipher system 中文意思是什麼

cipher system 解釋
密碼體制
  • cipher : n 1 零〈即0〉。2 數碼,阿拉伯數字。3 暗號,暗碼,密碼;密碼索引 (=cipher key)。4 (姓名首字母...
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. Cipher message database on financial management system based on this dissertation is an important sub - system of financial management system. it ' s of simple construction, and implement method is convenience. resolving the security problem of financial information, and it worth some reference value to developing database security and secret system in mis

    基於本文設計的財政密文數據庫系統是財政管理系統的一個重要子系統,結構簡單,實現方便,解決了財政信息的安全問題,對在mis中開發數據庫安全保密系統具有一定的參考價值。
  2. Hwpc have two modes cipher generated system to create random password, this part is a at89c2051 ocm, that is made of the atmel company, such some function as opening / closing door, modifying cipher, locking the control system, and so on all through operating the keyboard

    有線密碼控制器的兩種控制密碼設計成由用戶自己來設定,其主要控制器件是atmel公司製造的at89c2051 。通過鍵盤的操作,來實現系統的開關門、修改密碼、鎖定等功能。
  3. Security analyses of a variant of a new block cipher system ( called cac ) based on cellular automata theory are given using two cryptanalytic approaches. the results show that this variant of cac is very insecure under chosen - plaintext attacks

    利用兩種方法對一個基於細胞自動機的分組密碼系統cac的變形進行了分析,結果表明: cac的這種變形在選擇明文攻擊下是極不安全的。
  4. The paper discusses the development of web, browser / server mode conception and the content and mechanism of network security based on web, and also describes the basic conception and system of cipher theory, symmetric - based data encryption standard and advanced encryption standard and asymmetric - based rsa. it presents a detailed design of secrecy net of digital government, and advances a des - and - rsa - based security model of information exchange, which makes use of symmetric cryptographic algorithm to encrypt plaintext, and introduces public - key algorithm rsa to encrypt session key to compose digital envelope and to realize digital signature

    本文論述了web的發展及其browser / server模式概念,以及基於web的網路安全的內容與機制;闡述了密碼學的基本概念、分類,對稱密鑰密碼體制des與aes以及公開密鑰密碼體制rsa ;最後,利用一種基於des和rsa的信息交換安全模型,詳細地給出了一個數字政府的保密網系統設計方案。
  5. Koal network shield desktop security sets is the only software encryption system approved by the bureau of the state cipher administration committee. it uses many advanced technologies and has several patents

    格爾網盾桌面安全套件是唯一一個獲得國家密碼管理委員會辦公室批號的軟體加密系統,它採用多種先進技術,擁有多項專利。
  6. Strategic cipher system

    戰略密碼體制
  7. Tactical cipher system

    戰術密碼體制
  8. After that, an introduction of the relative knowledge of the 802. 1x, pki and the ellipse cipher system is given

    802 . 1x證書認證相關的pki公鑰設施基礎和橢圓曲線密碼體制相關知識。
  9. The paper finally revolves the secret cipher system, established and realizes one security practical information safe transmission model

    論文最後圍繞現代密碼體制,建立並實現了一個安全實用的信息安全傳輸模型。
  10. The results obtained in this thesis offers some new ideas and methods for studying of permutation theory in block cipher system

    上述工作為分組密碼中置換理論的研究提供了新的方法、新的思路,並得到了一批好的置換源。
  11. First, this paper discusses popular cipher system and cipher technology to ascertain system running method and encrypting arithmetic

    本文首先剖析了目前流行的密碼體制和密碼技術,以確定本系統的運行方式和加密演算法。
  12. Under finite precision, ways we always seek is easy to implement. and we encrypt the fh system with chaotic stream cipher. simulation results show that the security properties of fh sequence have been improved and the security of information is guaranteed even the fh patterns are broken

    大量的對比分析試驗表明,該密鑰生成器生成的混沌序列密碼的密碼學特性良好。同時,本文還努力的尋求一種在有限精度條件下混沌加密的可實現方案,並利用混沌序列密碼對跳頻系統進行加密。
  13. ( 2 ) a new digital frequency - hopping communication system based on cipher - quasi - chaotic sequence is proposed, which combines the cryptography and frequency - hopping technology. the system ' s protocol, base - band signal processing and modulation / demodulation algorithms of the radio - frequency part are designed, and the hardware experiment conducted on a prototype of the system show that the system functions well. the finite precision problem arising while taking use of chaotic signal to generate pseudo - random sequence is studied and the anti - tracking capability of the cipher - quasi - chaotic sequence is studied with the volterra - tls method proposed in this dissertation

    ( 2提出一種新的基於密碼準混飩序列的密碼與跳頻技術相結合的跳頻通信系統,並且進行了協議部分、拂信號處聊分、射頻調制解調演算法部分的模擬研究和系統的硬體實驗研究;研究了利用混飩信號產生偽隨機序列的有限精度實現問題,利用本文提出的m業肚m 113方法對密碼準混飩序列產生的跳頻碼的抗鵬干擾能力進行了模擬實驗研究。
  14. It ' s worth notice that, because the efficiency of public - key cipher is low, we introduce symmetric cipher, permutation code, and asymmetric cipher, rsa algorithm into the system to advance the efficiency of the whole system

    值得指出的是,由於公鑰密碼體制效率較低,所以該系統採用對稱密碼演算法和公鑰密碼演算法相結合,採用排列碼加密解密演算法和rsa演算法相結合,充分利用兩者的優點,彌補其不足。
  15. Section 2 studies the database access management technology based on microsoft sql server 2000 which is the nuclear technology of database management module in data synchronization system sever, and emphisizes on ole db database access technology. section 3 introduces two kinds of block cipher algorithm used in data synchronization system. : gost algorithm and rijndael algorithm, meanwhile offers interfaces in which encryption algorithm can be userdefined. this is the necleus of encryption module in data synchronization system server and client. section 4 studies network transmission management technology. this section mainly explores programming model and the network interface technology using completion ports to develop server which is the key technology of network transmission management module in data synchronized system server and client. section 5 introdues the brief using approach in data synchronized system server and client as well as some improvement suggestion

    第二部分研究了基於microsoftsolserver2000的數據庫訪問管理技術,著重介紹oledb數據庫訪問技術。它是數據同步系統服務器端數據庫管理模塊的核心技術。第三部分介紹了數據同步系統中利用的兩種分組密碼演算法: gost演算法和rijndael演算法,同時給出了一個用戶可以自定義加密演算法的介面。
  16. Functions are analyzed from the four components of network cipher computer, key distribution management center ( kdmc ), web management computer and secure remote access system ( sras ). suggestions are proposed for confidentiality, authentication and visit control. ipsec protocol architecture, important concepts and characteristics are studied in detail

    分析了密鑰管理中心、網路加密機、 web管理機和安全遠程接入四大部分的功能,給出了vpn網路密碼機系統的機密性保證、認證和訪問控制方法,詳細論述了ipsec基本協議、重要概念和特點。
  17. After the portable report controller or the hanged wired cipher report controller sends out the cipher to it, the open / close door controlling system realizes some function, opening / closing door, modifying cipher, locking the control system, and so on

    通過有線密碼控制器或便攜式遙控器發送密碼給主板控制器,再由主板控制器來實現開關門、修改密碼、鎖定開門器等功能。主線路板、便攜式遙控器及壁掛式有線密碼控制器的控製程序加密。
  18. Firstly, we discuss the general concepts of computer security and cryptology and describe the mostly used modem encryption methods and public key technologies including other typical algorithms. secondly, we put up a new combined security algorithm applied in the data transmission at network system on the base of introducing permutation code encryption ( a new type of block cipher ), and design the transmission system

    本文首先討論了數據加密技術中主要的數據加密方法,詳細討論了傳統密碼加密方法和公開密鑰加密方法及其他典型加密方法,並介紹了一種新型的分組密碼演算法?排列碼加密演算法,進而提出了一種應用於網路數據傳輸中的安全演算法。
  19. Many advanced software and hardware technologies are adopted in network cipher computer system

    Vpn網路密碼機系統中採用了先進的軟硬體技術。
  20. Configure and management functions of kdmc, configure functions of network cipher computer, vpn functions and performance are tested in the system testing

    系統測試中包括密鑰管理中心的配置和管理功能測試、網路密碼機的配置測試、 vpn功能測試和性能測試。
分享友人