secure communications 中文意思是什麼

secure communications 解釋
安全通信
  • secure : adj ( curer; curest)1 安心的;不必擔心的;有把握的。 2 可靠的。3 安全的。4 堅固的;牢固的。5 必...
  • communications : 溝通
  1. Infineon technologies ag, based in munich, germany, offers semiconductor and system solutions for the automotive and industrial sectors, for applications in the wired communications markets, secure mobile solutions and memory products

    英飛凌在中國涉及的領域包括:研發與設計;市場與銷售以及生產等各領域。
  2. The java secure socket extension jsse enables secure internet communications with ssl tls. it provides an application framework - a java version of the ssl and tls protocols - complete with the full range of functionality including data encryption, server authentication, message integrity, and more

    Java安全套接字擴展( jsse )利用ssl / tls可以進行安全的internet通信,它提供了一個具有完整功能的應用程序框架一個java版本的ssl和tls協議,這些功能包括數據加密、服務器認證、消息完整性,等等。
  3. Secure lines of communications supporting endless convoys of trucks are giving way to pulsed logistics that feature short - term, self - sufficient joint forces resupplied by precisely organized push packages

    由可靠的通訊線路保障的漫無盡頭的運輸車隊將讓位於脈動型的後勤,即由經過精心組織的物資投送實現的以短期自給自足為特徵的聯合作戰保障。
  4. The first key technique : using plain - text cipher and md5 message - digest algorithm to ensure stb and dhcp server ' s certificate and secure the stb and server ' s communications - the second key technique : using hmac algorithm to realize the safe functions - the third key technique : using ipsec to realize safe functions o those three methods " complexity increases in turn and the degree of the security increases as well which depend on the frame of the methods and the complexity of the algorithm. all theose three methods use the unique serial - number or a special slip - window to defend replay attack

    主要採用三種安全方案實現:第一種:利用約定的明文密碼驗證機頂盒與dhcp服務器的合法身份, md5驗證信息合法性:第二種:利用hmac演算法驗證機頂盒與服務器身份,信息合法性;第三種:利用ipsec驗證機頂盒與dhcp服務器身份與信息合法性。每一種方案中皆採用包序號唯一法或者滑動窗口法保證重放攻擊。此三種方案復雜度依次增加,安全度依次升高,主要取決于演算法的復雜度與架構的搭建。
  5. Upon completion of the course, participants will have an initial understanding of the increasing vulnerabilities and risks threatening today ' s network environments, state - of - the - art technologies that can help to protect the network against those threats, and cutting - edge techniques that can be used to secure network communications

    課程完成後,參加者將初步了解威脅今日網路環境的漸增的脆弱點和風險,能幫助您保護網路于那些威脅的科技,以及能防護網路通訊的頂尖技術。
  6. Quantum key distribution ( qkd ) is an important application of quantum information. using the miraculous properties of quantum mechanics qkd breaks thought the confines of classical encryption and can make our communications perfectly secure

    量子密碼學作為量子信息理論的一個重要方面,它利用量子力學的一些奇妙性質,突破了傳統密碼學的限制,能夠絕對安全地傳送信息。
  7. 5 ; and the establishment of a " secure direct communications " between the u. s. and taiwan military sec. 5

    去年中國從獄中釋放了兩位知名異議人士,魏京生與王丹,還有天主教的曾主教。
  8. All communications devices are completely secure and unjammable

    所有通信器材十分安全,不會受到干擾。
  9. Increased productivity - converged communications over a secure, reliable network

    提高工作效率-以安全可靠的網路提供通信服務;
  10. Is security in the communications infrastructure acceptable, for example, in the use of secure socket layer mutual authentication between eai middleware servers, or in the use of the https protocol ? is individual, point - to - point security acceptable between participating systems, or is an end - to - end model required

    是否可以接受通信基礎架構中的安全性,例如,是否在eai中間件服務器之間使用安全套接字層( secure socket layer , ssl )互相驗證,或者是否在使用https協議?
  11. A kind of chaotic synchronization system and its application for secure communications

    一種混沌同步系統及其在保密通信中的應用
  12. We must start at once to expand it and to secure our communications to it.

    我們必須迅速使之開始擴充,並確保到達該地的交通線。
  13. Bluetooth is a short range wireless communication technology that offers multiple data transfer rates, multiple packet types, low power operation and support for secure communications

    藍芽技術是一種短距離的無線通信技術,它提供了多種資料傳送率,多種封包類型,低功率運作而且對安全通信的支持。
  14. It presents an all - encompassing strategy based on four enabling factors : developing a high capacity communications infrastructure, establishing an open and secure common interface for electronic transactions, empowering our people with the know - how to use information technology, and nurturing a culture which stimulates creativity and welcomes advances in the use of it

    我們提出了一套全面策略,以四個要素為基礎,即發展高容量通訊基建為電子交易建立開放和穩妥的共通界面栽培通曉應用資訊科技的人才,以及營造激發創意和樂于應用先進資訊科技的文化和環境。
  15. First, xml technique is adopted to express message as xml documentation to satisfy the requirements of c / s network communication system, a message transport protocol is brought forward for package and transport of all the data over a steady tcp socket, which is applied to asynchronous, secure and reliable communications

    首先,在綜合分析客戶機服務器模型中通信系統整體要求的基礎上,引入了可擴展標記語言,制定了一個適用於異步、低可靠網路環境的跨平臺消息傳輸協議,用以封裝所有傳輸在tcp ip套接字上的數據。
  16. However, we have to consider one key point in order to share the medical information in a perfect telemedicine information sharing platform. that is to found the interface server besides the servers of his ( hospital information system ) and pacs ( picture arching and communication system ) in hospitals, so as to constitute the strategy based on hl7 ( health level seven ) and dicom ( digital imaging and communications in medicine ) for transmitting information from primitive servers in hospital to the data center servers of the sharing platform. at the same time, the internal network of hospital should be isolated from the private network of information sharing platform for the reason of secure and administration

    但要實現醫療信息共享,真正地建立起完善的遠程醫療信息共享平臺,需要考慮一個關鍵點:在各家醫院內的影像存檔與通信系統( picturearchivingandcommunicationsystem , pacs )與醫院信息系統( hospitalinformationsystem , his )服務器之外建設介面服務器系統,來制定基於美國衛生信息傳輸標準( healthlevelseven , hl7 )以及醫學數字成像與通信標準( digitalimagingandcommunicationsinmedicine , dicom )的his與pacs數據入庫策略。
  17. Customers have come to expect secure communications for transmitting credit card numbers, bank account numbers, and other such sensitive information across the net

    客戶期望通過安全的通信在網路上傳輸信用卡號、銀行帳號和其他敏感信息。
  18. Beyond the cleanup, hangzhou ' s ultimate goal is to secure world heritage site listing from the united nations for this transport artery that connected china ' s great west - to - east river systems, carrying the goods, taxes and official communications that sustained successive dynasties

    除清理以外,杭州的最終目標是從聯合國世界遺址名單上的要求來保護這條連接中國東西部河道系統、運輸貨物、稅款和官方聯絡以維系朝代傳承的交通動脈。
  19. Secure communications method for higher power information signal based on chaotic masking is proposed

    摘要提出了一種適合較大功率信息信號的混沌掩蓋通信方法。
  20. In the practice application, the project ? the large dam secure supervising and measuring system of taipu brake, which the penman participated himself, is introduced in detail, which includes the system synopsis, the definition of the pressure, the crack, the horizontal displacement and the vertical displacement, the compare of diversified measuring methods, the choice of the instruments and the configuration of the instruments, the system network topology configuration, the collocation of various metrical dots and instruments " demarcating and testing, the system software and the application software, the communications between the intelligent instruments and the primary interfaces of actual system

    在實踐應用方面,詳細介紹了筆者親自參與實施的工程? ?太浦閘大壩安全監測系統,包括系統簡介,揚壓力、裂縫、水平位移和垂直位移的定義,各種測量方法的比較,儀器的選型以及儀器的結構,系統的網路拓撲結構,各測點的布置以及儀器的標定測試,系統軟體和應用軟體,智能儀器與上位機的通信,實際系統的主要界面。為了論文的完整性,介紹了大壩安全監測專家系統。
分享友人