transmission authentication 中文意思是什麼

transmission authentication 解釋
傳輸證實
  • transmission : n 遞送;傳遞;傳達;傳染;移轉;【機械工程】傳動;傳遞;變速器;聯動機件;【無線電】傳送;發射;...
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. It uses xml encryption, xml signature and ssl technology to design and implement the solution of transmission of tender and evaluation documents separately which are based on the different security requirement. the solutions guarantees the secrecy, incontestability, integrity and identity authentication in the transmission of the bidding documents

    在標書傳遞子系統中根據不同的安全需求,使用xml加密、 xml簽名和ssl技術分別為投標書和評標書設計並實現了安全傳遞的方案,確保了標書傳遞中的保密性、完整性、長期不可否認性、時間有效性和用戶身份正確性。
  3. As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today ' s communication network. it can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission. our task focuses on studying the key technology in digital signature. the direct goal is to implement digital signature on the basis of dsp

    在現代的數字通信網路中,數字簽名作為數據認證技術中的一項關鍵技術,可以解決否認、偽造、篡改及冒充問題,用來保證信息傳輸過程中的完整性,提供信息發送者的身份認證和不可抵賴性。
  4. In this article, we perform a tri - layer security mechanism ; we improve the form authentication of asp. net in two places ; we also perform a new dynamic authentication based on two factor ; then we perform a new way to send the credential through the soap header ; we solve the problem about the key creation and the key storage and the transmission of the encrypted message ; after analyzing and discussing the soap protocol, we put forward a safely custom authentication through combining the digest authentication and soap protocol and credential

    在web服務安全方面提出了一些新看法,解決了一些新問題: 1 )提出了基於角色的三層安全機制; 2 )對asp , net的表單驗證技術提出了兩處新的改進: 3 )提出一種動態的雙因素口令認證方法,即在單因素(固定口令)認證基礎上結合第二個物理認證因素,以使認證的確定性按指數遞增。在此,本文提出了第二種認證因素?信任憑證。
  5. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  6. Our company bidirectional migration image data transmission facility through the military goods authentication, and supplies goods to the army volume production

    我公司雙向移動圖像數據傳輸設備通過軍品認證,並向部隊批量生產供貨
  7. The functions of the smc, such as authentication, accessing the database, commucation between the sever and the client, the encrypting information transmission between clients, have almost all been realized, and the algorithm has passed the compiling and linking and proved to be practical in function

    安全管理中心的各項功能,如認證,訪問,保密通信等均得到了實現。加密演算法程序以動態連接庫的形式實現,通過編譯和連接,能夠完成文件的加密和解密。
  8. A pki and smart cards - based security scheme is presental for documents transmission, in this scheme, the client - and server do the authentication each other firstly, encrypte data transmission channel and then transfer secure documents, which significantly improved the ftp security

    該方案在文件傳輸時先進行客戶端和服務器雙向身份認證,然後建立加密數據傳輸通道,在加密通道上安全地傳輸文件,這樣很大程度上提高了ftp的安全性。
  9. For the above reason, new security mechanism for wlan is necessary to make sure the data in transmission confidential, complete and undeniable. at the same time, it should provide identity certification and access control. the 802. 1x fulfils all the above requirements, which provides an upgraded certification and authentication method for controlling lan users ’ access through port - based certification

    然而常規的無線局域網安全措施如wep等都已被證明不再安全,人們已經認識到必須專門為wlan設計新的安全防護機制,以保護在wlan中傳輸數據的機密性、完整性和不可否認性,同時對請求接入wlan的用戶進行身份認證和訪問控制。
  10. The model of the network transmission is divided to unicast, broadcast and multicast. for the different model has different require, this issue is discuss about the authentication and key agreement from this respect

    網路傳輸分為單播、廣播和組播,鑒于不同的網路方式對密鑰的要求也有所不同,本文從網路傳輸方式的角度對身份認證,會話密鑰生成、更新技術進行討論。
  11. We select rubin logic to formally analyze the authentication and key exchange protocol designed for this transmission platform utilized, and the analysis result indicates that this authentication and key

    對于傳輸平臺所使用的認證和密鑰交換協議,本文選擇rubin邏輯對其進行形式化分析,分析結果表明該認證和密鑰交換協議具有一定的嚴密性。
  12. In this thesis, we deeply research on secure transmission technique in military information system and presented a multipurpose image watermarking algorithm together with a new authentication and key exchange protocol. they can be well used in the transmission platform

    本文深入研究了軍用信息系統安全傳輸技術,設計和實現了一個多功能數字圖像水印演算法和一個認證和密鑰交換協議,並將其應用到傳輸平臺中。
  13. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於數字證書和數字簽名技術的身份認證協議和密鑰交換協議,能夠有效地防止中間人的竊取和篡改,提高了身份認證的可靠性和密鑰交換的安全性;利用openssl標準庫函數實現系統的數據加密模塊,實現對稱加密、非對稱加密以及信息摘要的常用演算法。
  14. This platform utilizes several techniques, including cryptographic algorithms, one - way hash function, digital certification, secure protocol, watermarkng and etc. based on this platform, a new authentication and key exchange protocol is presented and has been well applied to this transmission platform

    該傳輸平臺使用了多項技術,包括密鑰演算法、單項散列函數、數字證書、安全協議和數字水印等技術。針對該傳輸平臺,提出了一個新的認證和密鑰交換協議,並在傳輸平臺得到了很好的應用。
  15. The authentication header ensures that the packet has not been altered or tampered with during transmission

    Ah確保包在傳輸中沒有被修改。
  16. According to some kinds of existed attacking methods that are aimed at the web system, the article discusses the feasibility to implement secure transmission tunnel on every layer in tcp / ip protocol, and the related secure protocol standard. and focusing on cryptography, the paper lucubrates the technology of secure transmission of information such as data encryption, digital signature, identity authentication and data integrality technology

    本文針對web系統中信息傳輸所面臨的安全威脅,從保障網路信息安全傳輸的角度,系統研究了tcp ip各個層次上實現安全通道的可行性及相關的安全協議標準,圍繞密碼體制,對數據加密、數字簽名、身份認證、數據完整性控制等信息安全傳輸技術進行了深入的探討。
  17. In addition, public key and symmetric key operations are employed simultaneously to ensure the secure transmission and authentication of data

    此外,文中以公鑰與單鑰演算法相結合的方式來確保數據的安全傳輸和認證。
分享友人