encryption technology 中文意思是什麼

encryption technology 解釋
加密技術
  • encryption : 編成密碼
  • technology : n. 1. 技術,工程,工藝。2. 製造學,工藝學。3. 術語(匯編)。
  1. The paper discussed the following four points : the security of java, the implemention of mvc pattern and the principle and implemention of the send and incept of e - mail based on java ; the principles and implemention of smtp, pop3 and imap, and the characteristic of the e - mail server sendmail, qmail and postfix ; the principles and implemention of symmetrical encryption and unsymmetrical encryption technology, and the advantages and disadvantages of them ; the characteristic of rubbish e - mail, and the principles and implemention of anti - rubbish e - mail technology

    本文研究的主要內容包括: java技術安全性, java對mvc模式的實現,以及java技術解決電子郵件發送和接收問題的原理和實現方法;電子郵件相關協議smtp , pop3和imap的原理和實現方法,以及電子郵件服務器sendmail 、 qmail和postfix的特點;對稱加密與非對稱加密技術的原理和實現方法,以及兩者的優點和缺點;典型垃圾郵件的特徵,以及反垃圾郵件技術的原理和實現方法。
  2. Encryption technology allows secure transmittal of information along the internet by encoding the transmitted data using a mathematical formula that scrambles the data

    加密技術通過數學公式對傳輸的數據進行編碼加密,從而使信息能夠安全地在網上傳輸。
  3. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,網路及其安全服務的實現(包括嵌入式協議棧usnet的選取、底層驅動程序的設計和安全協議ipsec的分析與實施) 。
  4. Using information encryption technology is more direct and more available to users

    對于廣大用戶來說,更為直接、也更為有效的辦法,就是使用信息加密技術。
  5. With the ground of information encryption technology, this paper analyzes network security architecture and makes deep research on user authentication on network application layer, especially on otp ( one - time password )

    本論文從網路安全體系結構分析入手,以信息加密技術為基礎,對網路應用層的身份認證技術,特別是一次性口令認證( otp )技術進行了深入研究。
  6. With the development of internet and electronic commerce, there is a high demand for information security. with the traditional encryption technology, the distribution of key still has n ' t a perfect solution. pki technology based on public key system resolves it through issuing the certificates by ca ( certification authority )

    但是在傳統的信息加密技術中,密鑰的分發一直沒有得到很好的解決,而基於公鑰體制的pki ( publickeyinfrastructure ,即公鑰基礎設施)技術通過簽證機關(即ca : certificationauthority )發布證書的方式較好地解決了這一問題。
  7. Pki is a combination of software, encryption technology, and server - based services designed to fill this void

    如果有人想要通過非法手段獲取您的軟體,他們或許會成功。
  8. Digital watermarking and encryption technology based on fingerprint are studied in this paper. with the analysis of current watermarking algorithms and combination of bio - identification technology, a digital watermarking system with insertion and extraction is realized

    本文研究了基於指紋的數字水印和加密技術。在分析當前數字水印技術及演算法的基礎上,結合生物識別技術,實現了一個水印嵌入與提取系統。
  9. Digital certificates and encryption technology help to guard against unauthorised access and ensure confidentially of tender submission

    利用數碼證書及先進的加密科技,系統可以防止有人擅自進入瀏覽及確保投標資料的保密。
  10. In addition to the standard security features to protect against unauthorised access, the most advanced encryption technology is used to ensure that only authorised tenderers could submit bids, that their bids once submitted cannot be altered and that they remain encrypted and inaccessible by all parties until the electronic tender box is opened under the same kind of procedures as apply with our existing manual system

    除具有標準的保密特點以防止擅自進入外,電子投標系統採用最先進的加密科技,以確保只有獲授權的投標者才可遞交標書,而且他們的標書一經遞交便不能更改,並會保持加密,任何人士均無法取得,直至本處按現有人手方法的同類程序把電子投標箱打開為止。
  11. In the application of pmos - 2000 system, the author carried out a hybrid encryption protocol with is suitable for information security transmission in electricity market with des, rsa and md5. with the pattern characteristics of pmos - 2000 power market operator system, and analyzed and compared with other encryption system, the author puts forward an implementing method, operational process and system structure of information encryption technology used in pmos - 2000, and the operating effects and projects which need further research and discussion were finally given. the research of this dissertation applied information security technology in power system project, which made it possible for information security transmission

    在pmos ? 2000系統的應用中,作者利用des對稱加密演算法、 rsa非對稱加密演算法、 md5數字簽名演算法實現了一套適合電力市場信息安全傳輸的混合加密體制,結合了pmos ? 2000發電市場技術支持系統的模式特點,通過與別的加密體制的分析比較,把混合加密體制應用於pmos ? 2000系統之上,並提出了這套加密系統在pmos ? 2000電力市場技術支持系統中的實現方法、運作過程和系統體系結構,最後給出了它的運行效果以及進一步可研究和探討的方案。
  12. In the electronic filing process, the return information will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key

    報稅表資料在傳送到稅務局前,系統會使用強化加密技術128 - bit secure socket layer ssl ,以「對稱密碼匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密碼匙」將資料作站對站式加密。
  13. In the return filing process, the return data will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key so that data confidentiality can be preserved

    系統會使用強化加密技術128 - bit secure socket layer ssl ,以「對稱密碼匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密碼匙」將資料作站對站式加密,以達保密效果。
  14. After introducing the correlative knowledge of vpn, such as tcp / ip protocols, encryption technology and so on, the article discusses in detail the ipsec protocol and the two main protocols of vpn : pptp and l2tp

    本文在介紹tcp / ip協議、加密技術等與vpn相關知識的基礎上,較詳細論述了ipsec協議和vpn的兩個主要協議:點到點隧道協議( pptp )和層2隧道協議( l2tp ) 。
  15. Based on the pki identity certification and data encryption technology, we proposed a security certification and channel - based data encryption mechanism. this paper discussed both the security certification and channel - based data encryption in detail. a prototype system was also built

    本文詳細描述了基於pki身份認證的用戶管理系統安全認證機制,並通過隧道技術實現了報文的安全數據加密,並給出了相應的工程實現。
  16. The system will issue notification of gld s tenders, specifications and documents to potential suppliers, receive submission of tender offers and display contract award notices. digital certificates and encryption technology help to guard against unauthorised access and ensure confidentially of tender submission

    系統能在網上發放招標通知、招標規格和文件給準供應商,同時亦會在網上接收準供應商的投標報價資料,以及列載批出合約通知。
  17. To remind ais that they should have adequate data security procedures, such as computer log - on and application - specific access passwords and data encryption technology, to protect against theft and unauthorised access of computer equipment or information in open - plan areas

    中提醒認可機構,要有足夠的資料保安程序,例如電腦的登入及接達特定應用程式的密碼,以及數據加密技術,以防範在開放式范疇內的電腦設備或資料被盜取及被未經授權取用。
  18. To protect customers personel information so that customers can shop on our website safely, we are authenticated by thawte s secure server ids and all transactions are secured by ssl encryption technology. please click on the the globally recognized thawte secure site seal to verify

    為保障顧客個人資料安全及令顧客放心網上購物,本網站採用國際認可的thawte商業網站保安系統及網上付款服務及獲發安全商業網站電子證書請參閱網頁左下角thawte徽號
  19. With the development of computer technology and the advancement of digital media storage and transmission, it is a serious challenge that protecting the copyright of digital media. and at the same time, it is easy to break through information security system. the tradition information encryption technology is easy to be cracked under the open network environment

    近年來隨著計算機技術的飛躍發展,數字媒體存儲與傳輸技術的進步,數字媒體的版權保護正受到日益嚴重的挑戰,信息安全系統正變的不堪一擊,傳統的信息加密技術在開放的網路面前,極易被破解。
  20. Let me introduce the encryption technology to you

    讓我介紹加密技術給你認識吧!
分享友人