數據保密通信 的英文怎麼說

中文拼音 [shǔbǎotōngxìn]
數據保密通信 英文
data security communication
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 通量詞(用於動作)
  • 數據 : data; record; information
  • 通信 : communication; communicate by letter; correspond
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、電訊的機性和完整性、電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了息加技術以及各國立法對碼技術的進出口及使用的控制,第六章介紹了字簽名的概念及原理,並以bolero為例介紹了字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了電訊制度產生的必然性;第八章過對各國立法對電子證的法律效力的規定,論述了對電子交易至關重要的電訊的不可抵賴性。
  2. Some features of this chip are listed below : firstly, it opts for ir data transmit technology, so it have the advantages of little emi, simple operation, low cost, etc. secondly, the synchrony method makes it have good noise suppression and ber quality

    該「紅外名片交換專用晶元」能獨立完成名片交換和管理的任務,具有顯著優點: 1採用紅外的方式,具有技術方案成熟,交換方法簡單,性好,相互電磁干擾小,成本低、簡單易用等優點。
  3. Abstract : in this paper, we present a series of important applications of blind signature to computer security communication, especially to electronic voting and electronic cash

    文摘:根近年來國內外關于字簽名的研究背景及進展,闡述盲簽名在計算機,特別是在電子貨幣等方面的一系列重要應用。
  4. As a new branch of information security, information hiding technology including digital watermarking and steganography aims to protect intellectual property rights of multimedia contents and to send secret messages under the cover of a carrier signal

    息隱藏是息安全領域中的一項新興技術,主要有字水印和寫兩大分支,分別用於多媒體的版權護和隱蔽
  5. Compared with traditional communication networks, a data communication network has the advantages of digitalized data, broad bandwidth, intelligent systems, networking structures, integrated services, strong anti - interference and high security. it can provide various communication services with uniform platforms, which are what the telecommunication owners have built up or / and are building

    網與傳統網相比具有字化、寬帶化、智能化、網路化、綜合化、抗干擾能力強、性強等特點,而且能夠為各種業務提供統一的平臺,這也是各個電運營商目前在建或建設完成的網路平臺。
  6. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,字圖像、音頻和視頻產品愈來愈需要一種有效的版權護方法,另外系統在網路環境下的息安全問題也日益顯露出來.字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將字、序列號、文字、圖像標志等版權息嵌入到多媒體中,以起到版權護、秘文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  7. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依;電子文件歸檔管理層中的主要任務是要建立起嚴的歸檔制度,同時結合「文件生命同期表」建立檢驗措施證電子文件在歸檔過程中息內容的原始性、真實性;電子檔案管層中主要任務是建立電子檔案原始性、真實性檢驗及原始恢復管理措施,過對電子檔案載體的維護、建立電子檔案維護管理的息文檔等工作,確管期限中的電子檔案持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性護體系安全控制,過對系統工作人員授權分散化、建立用戶標識與認證技術等措施確護體系」安全運行;加強「護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對護電子文件、電子檔案息原始性、真實性有著重要意義。
  8. Digital watermarking is the technology which embeds copyright information including product id, text content or image logo into multimedia for copyright protection, secret communication and discrimination of the data files

    所謂字水印技術就是將息如產品序列號、文本內容、圖像標志等版權息嵌入到多媒體中,以起到版權護、秘文件的真偽鑒別等作用。
  9. Digital watermarks may be all kinds of information which can be embedded into multimedia data, just as digits, serial numbers, text, image symbols, so it can be used in copyright protection, marker production, covert communication, data ownership confirmation, data authentication

    字水印是指嵌入到多媒體中的息,可以是字、序列號、文字、圖像標志等各類息,以起到版權護、標志產品、秘、證實歸屬權、鑒別真偽等作用。
  10. For wireless communications, direct sequence code division multiple access ( ds - cdma ) techniques have received a great deal of attention due to the expectation of capacity increase, interference rejection capability, security, and so on. in a high data rate application such as multimedia services, however, the capacity of ds - cdma systems is limited by both the inter - chip, or inter - symbol interference

    Cdma技術以其高抗干擾能力、高容量、高性等技術優勢在第三代移動系統中被廣泛應用,然而在高速業務中,嚴重的碼間干擾和符號間干擾會導致系統性能明顯下降。
  11. On the other hand, the opening and insecure internet brings up a new task to the rfmdms based on the internet that how to ensure the security of data transporting in many application fields such as the military equipments " maintenance and etc. the security of data transporting on the internet is mainly made up of three aspects : identity authentication, encrypted data transporting and digital signature

    網路傳輸安全主要解決在網路環境下用戶之間身份驗證、傳輸以及實現字簽名三個方面問題:用戶身份驗證證了的源點和目的點的正確性;傳輸證了在網路的中間節點不會泄露字簽名可以證發送息的一方不能對自己發送過的息進行否認。
  12. In this article, two projects - " sqy - 15 encrypt subsystem of hospitalization insurance system " and " general image compress flatform " are combined to get a resolvent scheme to realize data encrypt and image compress based on digital signal processor ( dsp ) and application specific integrated circuits ( asic ). this article includes three key technologies in designing and realizing the data encrypt card and the image compress flatform. they are : ( 1 ) design of dsp application system ; ( 2 ) epld designing technology using vhdl language ; ( 3 ) pci interface technology

    本文結合「 sqy - 15醫療息系統加子系統」和「用圖像壓縮平臺」兩項目,提出了基於號處理器( dsp )和可編程專用集成電路( asic )實現卡和圖像壓縮平臺的解決方案,重點介紹了基於dsp的加解卡和圖像壓縮平臺設計與實現中的三個關鍵技術: ( 1 ) dsp應用系統設計; ( 2 ) vhdl語言設計epld技術; ( 3 ) pci介面技術。
  13. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路系統,該系統將對稱加演算法3des與非對稱加演算法rsa相結合對,用公鑰演算法rsa和單向散列函md5實現對文件的字簽名,有效地實現了網路系統中的息加字簽名、身份認證等功能,證了發送方所發送息的秘性、鑒別性、完整性及不可否認性。
  14. Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities

    首先對電子政務系統網路的安全進行了分析,其中包括網路的安全風險分析、安全需求分析、安全目標分析,以及電子政務的安全策略分析;然後,從物理安全、訪問控制、護、安全審計、病毒防護、安全備份和安全管理等方面對電子政務網路安全解決方案進行了分類研究;最後,作為一個研究應用工程實例,過對綿陽市電子政務息網路的風險分析及安全需求分析,對其網路安全的整體解決方案進行了詳細設計。
  15. In order to get high quality voice in spite of low - bandwidth, our system uses several kinds of voice compression algorithms, and it realizes the functions of voice activation and jitter compensation. on the other hand, we use some methods to make voice communication safe. the methods includes : filling traffic, encrypting voice datagram with conventional encryption algorithms ; encrypting session key with asymmetric encryption, multiple authentication

    為了鏈路不被分析,系統實現了一個量填充器;為了對傳輸中的語音包進行加,系統提供了des 、 idea 、 blowfish和keyfile等各種常規加方法;為了利用對稱加的快速性和公開鑰加的方便性,系統只對會話鑰進行公開鑰加
  16. The dynamics behavior is researched. at same time the qualitative character and the effect of controls parameter to this system is analyzed. all the researches provide the theoretic basis of the problem about chaotic secure communication

    詳細的分析了一種新的混沌系統,對其動力學行為進行了研究,分析了這個系統的定性特徵,並根所提出的不同控制參,研究了其對系統的混沌行為的相關影響,為我們接下來要研究的混沌問題奠定了理論基礎。
  17. Up to now, the theory researches about chaotic phenomenon are mature. there are many chaotic models that produce the chaotic sequences, such as logistic map, tent map, chebyshev map, piecewise linear map. however, the application researches about chaos are limited to the fields of data encryption and secure communication

    混沌現象是當前理論研究和工程應用的前沿和熱門課題,混沌理論的研究已較成熟,混沌模型也很多,如典型的logistic映射、 tent映射、 chebyshev映射以及分段線性映射等,而其應用研究主要局限於領域。
  18. According to some kinds of existed attacking methods that are aimed at the web system, the article discusses the feasibility to implement secure transmission tunnel on every layer in tcp / ip protocol, and the related secure protocol standard. and focusing on cryptography, the paper lucubrates the technology of secure transmission of information such as data encryption, digital signature, identity authentication and data integrality technology

    本文針對web系統中息傳輸所面臨的安全威脅,從障網路息安全傳輸的角度,系統研究了tcp ip各個層次上實現安全道的可行性及相關的安全協議標準,圍繞碼體制,對字簽名、身份認證、完整性控制等息安全傳輸技術進行了深入的探討。
  19. Finally, chaotic digital sequences were applied to secrecy comrnunication among ic card system. the system model was designed and a simulation analysis for the secrecy coininunication with computer was also given

    最後,從安全的角度考慮,提出將混沌字序列應用於讀卡器系統的數據保密通信中去,並設計了實現模型,進行了計算機模擬模擬。
  20. Wireless features : data privacy

    無線電特徵:
分享友人