數據保密通信 的英文怎麼說
中文拼音 [shǔjùbǎomìtōngxìn]
數據保密通信
英文
data security communication- 數 : 數副詞(屢次) frequently; repeatedly
- 據 : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
- 保 : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 通 : 通量詞(用於動作)
- 數據 : data; record; information
- 通信 : communication; communicate by letter; correspond
-
The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。Some features of this chip are listed below : firstly, it opts for ir data transmit technology, so it have the advantages of little emi, simple operation, low cost, etc. secondly, the synchrony method makes it have good noise suppression and ber quality
該「紅外名片交換專用晶元」能獨立完成名片交換和管理的任務,具有顯著優點: 1採用紅外數據通信的方式,具有技術方案成熟,交換方法簡單,保密性好,相互電磁干擾小,成本低、簡單易用等優點。Abstract : in this paper, we present a series of important applications of blind signature to computer security communication, especially to electronic voting and electronic cash
文摘:根據近年來國內外關于數字簽名的研究背景及進展,闡述盲簽名在計算機保密通信,特別是在電子貨幣等方面的一系列重要應用。As a new branch of information security, information hiding technology including digital watermarking and steganography aims to protect intellectual property rights of multimedia contents and to send secret messages under the cover of a carrier signal
信息隱藏是信息安全領域中的一項新興技術,主要有數字水印和數字密寫兩大分支,分別用於多媒體數據的版權保護和隱蔽通信。Compared with traditional communication networks, a data communication network has the advantages of digitalized data, broad bandwidth, intelligent systems, networking structures, integrated services, strong anti - interference and high security. it can provide various communication services with uniform platforms, which are what the telecommunication owners have built up or / and are building
數據通信網與傳統通信網相比具有數字化、寬帶化、智能化、網路化、綜合化、抗干擾能力強、保密性強等特點,而且能夠為各種通信業務提供統一的平臺,這也是各個電信運營商目前在建或建設完成的網路平臺。The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before
隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives
「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依據;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性保護體系安全控制,通過對系統工作人員授權分散化、建立用戶標識與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對保護電子文件、電子檔案信息原始性、真實性有著重要意義。Digital watermarking is the technology which embeds copyright information including product id, text content or image logo into multimedia for copyright protection, secret communication and discrimination of the data files
所謂數字水印技術就是將數字信息如產品序列號、文本內容、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別等作用。Digital watermarks may be all kinds of information which can be embedded into multimedia data, just as digits, serial numbers, text, image symbols, so it can be used in copyright protection, marker production, covert communication, data ownership confirmation, data authentication
數字水印是指嵌入到多媒體數據中的信息,可以是數字、序列號、文字、圖像標志等各類信息,以起到版權保護、標志產品、秘密通信、證實數據歸屬權、鑒別數據真偽等作用。For wireless communications, direct sequence code division multiple access ( ds - cdma ) techniques have received a great deal of attention due to the expectation of capacity increase, interference rejection capability, security, and so on. in a high data rate application such as multimedia services, however, the capacity of ds - cdma systems is limited by both the inter - chip, or inter - symbol interference
Cdma技術以其高抗干擾能力、高容量、高保密性等技術優勢在第三代移動通信系統中被廣泛應用,然而在高速數據業務中,嚴重的碼間干擾和符號間干擾會導致系統性能明顯下降。On the other hand, the opening and insecure internet brings up a new task to the rfmdms based on the internet that how to ensure the security of data transporting in many application fields such as the military equipments " maintenance and etc. the security of data transporting on the internet is mainly made up of three aspects : identity authentication, encrypted data transporting and digital signature
網路數據傳輸安全主要解決在網路環境下用戶之間身份驗證、數據加密傳輸以及實現數字簽名三個方面問題:用戶身份驗證保證了通信的源點和目的點的正確性;數據加密傳輸保證了數據在網路的中間節點不會泄露通信秘密;數字簽名可以保證發送信息的一方不能對自己發送過的信息進行否認。In this article, two projects - " sqy - 15 encrypt subsystem of hospitalization insurance system " and " general image compress flatform " are combined to get a resolvent scheme to realize data encrypt and image compress based on digital signal processor ( dsp ) and application specific integrated circuits ( asic ). this article includes three key technologies in designing and realizing the data encrypt card and the image compress flatform. they are : ( 1 ) design of dsp application system ; ( 2 ) epld designing technology using vhdl language ; ( 3 ) pci interface technology
本文結合「 sqy - 15醫療保險信息系統加密子系統」和「通用圖像壓縮平臺」兩項目,提出了基於數字信號處理器( dsp )和可編程專用集成電路( asic )實現數據加密卡和圖像壓縮平臺的解決方案,重點介紹了基於dsp的數據加解密卡和圖像壓縮平臺設計與實現中的三個關鍵技術: ( 1 ) dsp應用系統設計; ( 2 ) vhdl語言設計epld技術; ( 3 ) pci介面技術。The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data
在此基礎上,本文設計了網路通信數據加密系統,該系統將對稱加密演算法3des與非對稱加密演算法rsa相結合對數據加密,用公鑰演算法rsa和單向散列函數md5實現對文件的數字簽名,有效地實現了網路通信系統中的信息加密、數字簽名、身份認證等功能,保證了發送方所發送信息的秘密性、鑒別性、完整性及不可否認性。Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities
首先對電子政務系統網路的安全進行了分析,其中包括網路的安全風險分析、安全需求分析、安全目標分析,以及電子政務的安全策略分析;然後,從物理安全、訪問控制、通信加密、數據保護、安全審計、病毒防護、安全備份和安全管理等方面對電子政務網路安全解決方案進行了分類研究;最後,作為一個研究應用工程實例,通過對綿陽市電子政務信息網路的風險分析及安全需求分析,對其網路安全的整體解決方案進行了詳細設計。In order to get high quality voice in spite of low - bandwidth, our system uses several kinds of voice compression algorithms, and it realizes the functions of voice activation and jitter compensation. on the other hand, we use some methods to make voice communication safe. the methods includes : filling traffic, encrypting voice datagram with conventional encryption algorithms ; encrypting session key with asymmetric encryption, multiple authentication
為了保證通信鏈路不被分析,系統實現了一個通信量填充器;為了對傳輸中的語音數據包進行加密,系統提供了des 、 idea 、 blowfish和keyfile等各種常規加密方法;為了利用對稱加密的快速性和公開密鑰加密的方便性,系統只對會話密鑰進行公開密鑰加密。The dynamics behavior is researched. at same time the qualitative character and the effect of controls parameter to this system is analyzed. all the researches provide the theoretic basis of the problem about chaotic secure communication
詳細的分析了一種新的混沌系統,對其動力學行為進行了研究,分析了這個系統的定性特徵,並根據所提出的不同控制參數,研究了其對系統的混沌行為的相關影響,為我們接下來要研究的混沌保密通信問題奠定了理論基礎。Up to now, the theory researches about chaotic phenomenon are mature. there are many chaotic models that produce the chaotic sequences, such as logistic map, tent map, chebyshev map, piecewise linear map. however, the application researches about chaos are limited to the fields of data encryption and secure communication
混沌現象是當前理論研究和工程應用的前沿和熱門課題,混沌理論的研究已較成熟,混沌模型也很多,如典型的logistic映射、 tent映射、 chebyshev映射以及分段線性映射等,而其應用研究主要局限於數據加密、保密通信領域。According to some kinds of existed attacking methods that are aimed at the web system, the article discusses the feasibility to implement secure transmission tunnel on every layer in tcp / ip protocol, and the related secure protocol standard. and focusing on cryptography, the paper lucubrates the technology of secure transmission of information such as data encryption, digital signature, identity authentication and data integrality technology
本文針對web系統中信息傳輸所面臨的安全威脅,從保障網路信息安全傳輸的角度,系統研究了tcp ip各個層次上實現安全通道的可行性及相關的安全協議標準,圍繞密碼體制,對數據加密、數字簽名、身份認證、數據完整性控制等信息安全傳輸技術進行了深入的探討。Finally, chaotic digital sequences were applied to secrecy comrnunication among ic card system. the system model was designed and a simulation analysis for the secrecy coininunication with computer was also given
最後,從安全通信的角度考慮,提出將混沌數字序列應用於讀卡器系統的數據保密通信中去,並設計了實現模型,進行了計算機保密通信模擬模擬。Wireless features : data privacy
無線電通信特徵:數據保密分享友人