end-to-end encryption 中文意思是什麼

end-to-end encryption 解釋
端到端加密
  • end : n 1 端,尖,末端,終點。2 邊緣;極點,極限。3 結局,結果。4 目的。5 最後,死。6 【紡織;印染】經...
  • to : adv 到某種狀態;〈特指〉到停止狀態;關閉。 ★也常和動詞結合,略去其後賓語,而構成成語: The door i...
  • encryption : 編成密碼
  1. In the end, quick implementation of kasumi, f8 and f9 are simulated under the condition of windows 98 with celeron 633 and 128m memory, the simulation data show that the f8 algorithm is capable of achieving the encryption rate up to 1. 9mbit / s, while f9 algorithm only takes 20ms to compute the mac with the length of 5114 bits, both of which can reach the basica requirement of 3g

    在本文的最後我們對kasumi , f8演算法和f9演算法的快速實現進行了具體的模擬, f8演算法的具體實現是在windows98 ,賽揚633mhz和128m內存的環境下其加密速率可以達到1 . 9mbps ,而f9演算法在同樣的條件下計算5114比特的字元串的消息認證碼所需時間僅為20毫秒,這些速率基本上可以滿足3g中高速率傳輸的要求。
  2. In the electronic filing process, the return information will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key

    報稅表資料在傳送到稅務局前,系統會使用強化加密技術128 - bit secure socket layer ssl ,以「對稱密碼匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密碼匙」將資料作站對站式加密。
  3. In the return filing process, the return data will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key so that data confidentiality can be preserved

    系統會使用強化加密技術128 - bit secure socket layer ssl ,以「對稱密碼匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密碼匙」將資料作站對站式加密,以達保密效果。
  4. Terrestrial trunked radio - security - synchronization mechanism for end - to - end encryption v1. 1. 1

    地面集群無線電.安全.端對端加密用同步化機制
  5. Terrestrial trunked radio - security - synchronization mechanism for end - to - end encryption endorsement of the english version en 302109 v1. 1. 1 2003 - 10 as german standard

    地面中繼無線電.安全.端到端加密的同步機制
  6. Based on the analysis of relatively mature network security technology that can be introduced by sip, by the means of improving and applications, the article realizes tls hop - by - hop encryption, s / mime end - to - end encryption mechanism, improved http digest authentication, s / mime end - to - end signature mechanism and so on

    在分析現今可以借鑒的用來對sip通信進行保護的相對比較成熟的網路安全技術的基礎上,通過改進和應用,實現了包括tls逐跳加密, s / mime端到端加密等的加密機制以及改進的http摘要認證, s / mime端到端簽名等的身份鑒定機制。
  7. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算法,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器里,和以idea加密演算法為基礎設計的密碼流發生器( ksg )產生的密碼序列進行加解密運算,並且研究了此加密過程的密碼同步問題。
  8. In this thesis, the basic problem of network security, some correlative protocols and cryptology are discussed at first, math theory in point is also studied. especially, a sort of new matrix method of solving quadratic equation over gf ( 2m ) is given, which is the key of selecting random point over elliptic curves. no better solution has been found in related literature in the world. compared with ieee p1363 ' s method, it is easy to implement the software and obtain high efficiency, etc. then the basic operation of elliptic curve is debated and the steps of finding secure curve and basis point over gf ( 2m ) are presented. moreover, the encryption and decryption schemes of the ecc are designed and the security problem of ecc is also considered. in the end, ecc by koblitz curves are implemented

    文章首先討論了網路安全基本問題、網路安全協議和密碼學;對相關數學理論進行了研究,特別是給出了一種新的求解gf ( 2 ~ m )上二次方程的矩陣法,而它是選取橢圓曲線上的隨機點的關鍵步驟,和ieeep1363的方法相比,它有易於軟體實現、效率高等優點,在國內外相關文獻上還未見到更好的求解方法;接著討論了橢圓曲線的基本運算,進而給出了在gf ( 2 ~ m )上選取安全曲線及基點的步驟;文章還設計了橢圓曲線加密系統的加解密方案,討論了橢圓曲線系統的安全性問題。最後文章就koblitz曲線加密系統進行了軟體實現。
  9. Next, according to symmetry encryption, asymmetry encryption and certificate in encryption principle and encryption programming in java, implements secure and creditable communication between client end and server end

    其次,利用密碼學原理中的對稱加密、非對稱加密以及證書,結合java中密碼學編程,從而實現客戶端和服務器端安全和可信的通信。
  10. Since the gsm network has its own security mechanism, the in - the - air encryption algorithm is enough for most wap services. however, to implement safe end - to - end services with stringent requirements, like online banking and other financial transactions, additional security is needed

    Gsm網路本身有很好的安全機制,空中加密演算法對大多數wap業務足夠了。但如果wap要實現一些需求嚴格的端對端安全的業務,如在線銀行及其它金融交易,還需要增加數據的安全性。
  11. Dialog security provides end - to - end encryption and remote authorization for conversations to specific services

    對話安全模式為到特定服務的會話提供端到端的加密和遠程授權。
  12. End - to - end encryption methodology is adopted to ensure data security and secrecy in the course of transmission to ird.

    有關系統採用點對點加密技術,以確保資料在傳送到稅務局途中的安全和保密。
  13. Service broker dialog security provides end - to - end encryption and authorization for conversations between specific services

    Service broker對話安全模式為特定服務間的會話提供端到端的加密和授權。
  14. Notice, however, that transport security does not provide end - to - end encryption, and does not provide authentication for individual conversations

    但請注意,傳輸安全模式不提供端到端的加密,而且也不為單個會話提供身份驗證。
  15. A encryption - employing the network and security measures under the esd platform, i. e. the end - to - end encryption methodology using secure sockets layer and public key infrastructure

    A加密應用已建立在公共服務電子化平臺上的網路及保安設施,包括採用保密插口層ssl及公匙基建pki的點對點加密技術。
分享友人