encryption protocol 中文意思是什麼

encryption protocol 解釋
加密協議
  • encryption : 編成密碼
  • protocol : n 1 議定書;調查書,始末記。2 (條約等的)草案,草約;(羅馬教皇詔書等的)首尾程式。3 〈the P 〉 ...
  1. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  2. Weca is also preparing to introduce aes, the latest security protocol, but which so far requires additional hardware acceleration for encryption using a coprocessor - something mobile devices have so far lacked

    Weca還準備引入最新的安全性協議aes ,但aes至今還需要通過使用協處理器來對加密進行額外的硬體加速目前的移動設備還沒有這一功能。
  3. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,網路及其安全服務的實現(包括嵌入式協議棧usnet的選取、底層驅動程序的設計和安全協議ipsec的分析與實施) 。
  4. 2. some protocols in the standard are improved, and one of them, namely the key management protocol based on key distribution center, is applied in the newly designed network interface card with encryption

    2 、改進了標準中的部分密鑰管理協議,並把基於密鑰發放中心的密鑰管理協議應用到了新設計的加密網卡。
  5. On core service, we implement an access control strategy based on role, digital signature and encryption / decryption of soap message by using usbkey hardware, stateful web service through extending simple object access protocol ( soap ), and a kind of log management based on rank. on transport adaptering, we implement mechanisms for priority - based transmitting and rules - based transmitting, and implement a transport adapter based on http request / response model. finally, on service adaptering, we discuss two service wrapper mechanisms : runtime wrapper mechanism and factory method wrapper mechanism, which can be used to encapsulate difference of various web service containers, and implement a service adapter

    在核心服務方面,通過擴展簡單對象訪問協議( simpleobjectaccessprotocol , soap )實現有狀態的web服務,然後討論了基於角色的訪問控制與基於usbkey盤的soap消息的數字簽名與加密的實現、基於分級的日誌處理模型的實現;在傳輸適配方面,實現了基於優先級和基於規則的消息轉發機制,實現了基於http請求/響應模型的傳輸適配器;在服務適配方面,討論了兩種服務的封裝機制:運行時封裝機制與工廠方法封裝機制,結合這兩種機制並對服務適配器做了實現。
  6. Currently, security protocol is a hot research field in network security and has a very important effect for guarantee the network security. but, if the information has been displaced or modified by virus and trojan horse before encryption in that the transmitted information is invalid although the protocol is secure

    安全協議是當前網路安全領域的研究熱點,在保障網路安全方面起著重要的作用,但是如果信息在加密前被病毒、木馬程序替換或者篡改了,這樣雖然協議本身是安全的但是傳輸的信息已經失效。
  7. In the application of pmos - 2000 system, the author carried out a hybrid encryption protocol with is suitable for information security transmission in electricity market with des, rsa and md5. with the pattern characteristics of pmos - 2000 power market operator system, and analyzed and compared with other encryption system, the author puts forward an implementing method, operational process and system structure of information encryption technology used in pmos - 2000, and the operating effects and projects which need further research and discussion were finally given. the research of this dissertation applied information security technology in power system project, which made it possible for information security transmission

    在pmos ? 2000系統的應用中,作者利用des對稱加密演算法、 rsa非對稱加密演算法、 md5數字簽名演算法實現了一套適合電力市場信息安全傳輸的混合加密體制,結合了pmos ? 2000發電市場技術支持系統的模式特點,通過與別的加密體制的分析比較,把混合加密體制應用於pmos ? 2000系統之上,並提出了這套加密系統在pmos ? 2000電力市場技術支持系統中的實現方法、運作過程和系統體系結構,最後給出了它的運行效果以及進一步可研究和探討的方案。
  8. After introducing the correlative knowledge of vpn, such as tcp / ip protocols, encryption technology and so on, the article discusses in detail the ipsec protocol and the two main protocols of vpn : pptp and l2tp

    本文在介紹tcp / ip協議、加密技術等與vpn相關知識的基礎上,較詳細論述了ipsec協議和vpn的兩個主要協議:點到點隧道協議( pptp )和層2隧道協議( l2tp ) 。
  9. The second one explains how to get excellent capability of ssl protocol by discussing of the spent on encryption, the selection of arithmetic and the size of record. finally the embedded ssl protocol is established according to the characteristic of embedded internet web system, the standard for security and demand for performance, and message format during handshake is designed, then the embedded ssl protocol is implemented in embedded internet web system

    然後根據嵌入式web系統的特點、安全標準及性能要求等,制定了嵌入式ssl協議;設計了實現嵌入式ssl協議的策略,並以模塊化的方法提出了實現的系統結構,設計了嵌入式ssl協議的握手報文格式;並在嵌入式web服務器客戶端上分別實現了嵌入式ssl協議。
  10. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。
  11. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。
  12. On the basis of it, i design and implement ipsec in the network protocol stack of linux kernel, which can verify the encryption, integrity and authenticity of data at the ip level. it solves the problem of identification deceit, malicious modification and interception when datum is transmitted on the network, and the security of network transmission is improved greatly

    在此基礎上,在linux內核ip協議棧中設計並實現了ipsec ,在ip層提供數據傳輸的機密性、完整性和真實性,解決ip數據報在網路中傳輸時的身份偽造、被人篡改以及被竊聽的問題,使網路傳輸安全性得到很大提高。
  13. In this paper, from the viewpoint of the design of a safe architecture, the security problem of openeai message system is studied, and ssl protocol and encryption strategy is studied in transmission layer and application layer

    從安全體系結構設計的觀點,本文還研究了openeai消息系統的安全問題,按傳輸層和應用層研究了ssl協議和密碼學的加密策略。
  14. Tkip is a rapid rekeying protocol that changes the encryption key about every 10, 000 packets and according to dennis eaton, weca chairman, it will be available in the second quarter of this year

    Tkip是一種快速重新加密協議,它大約每隔10 , 000個包就更改加密密鑰,而且據weca主席dennis eaton所說,今年第二季度就可使用它。
  15. Ip security protocol ( ipsec ) provides identity authentication and high strength data encryption for traffic at the ip layer to protect the integrality and confidentiality of the packets. ipsec ensure the security of ip layer and upper layer protocol, such as tcp, udp and so on

    Ip安全( ipsec )協議使用強的密碼認證和加密演算法來保護ip通信的完整性和機密性,為ip及上層協議(如tcp和udp )提供安全保證。
  16. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於數字證書和數字簽名技術的身份認證協議和密鑰交換協議,能夠有效地防止中間人的竊取和篡改,提高了身份認證的可靠性和密鑰交換的安全性;利用openssl標準庫函數實現系統的數據加密模塊,實現對稱加密、非對稱加密以及信息摘要的常用演算法。
  17. Block encryption protocol

    分組加密協議
  18. Conformance test for the project 25 des encryption protocol

    項目25 des加密協議的符合性試驗
  19. In cryptology technology, which can be used to create digital evidence, we addressed three problems : a encryption scheme integrated fault tolerance and digital signature, a identification protocol based on zero - knowledge interactive proof, digital signature included single digital signature, multiple digital signature and ( n, t ) threshold digital signature. 5. the sk protocol was improved and s

    4 .在適合生成數字證據的密碼學技術研究中提出了:一個集成數據簽名和容錯技術並能在加密、傳送、解密和認證三個過程中實現容錯的rsa加密方案;一個基於零知識證明的身份認證協議;基於零知識證明的數字簽名方案。
  20. Project 25 encryption protocol

    項目25加密協議
分享友人