有等效加密 的英文怎麼說

中文拼音 [yǒuděngxiàojiā]
有等效加密 英文
wired equivalent privacy
  • : 有副詞[書面語] (表示整數之外再加零數): 30 有 5 thirty-five; 10 有 5年 fifteen years
  • : Ⅰ量詞1 (等級) class; grade; rank 2 (種; 類) kind; sort; type Ⅱ形容詞(程度或數量上相同) equa...
  • : Ⅰ名詞(效果; 功用) effect; efficiency; result Ⅱ動詞1 (仿效) imitate; follow the example of 2 ...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  1. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增,其中包含了各種機信息(例如軍事機信息、商業機信息、個人隱私信息) 。由於目前的網路系統缺乏足夠的安全性,不能防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何措施
  2. It is necessary to adopt efficient institutional arrangement to avoid supervisors loafing on their job, being captured or obtaining private interest with their power. it include form, amplify and carry out all kinds of rules and regulations strictly in daily work, form incentive mechanism that combine standing wage with incentive wage and promotion system, and reinforce punishment to whom obtain private interest with their power

    必須採取的制度安排,克服監管者偷懶、 「被俘」及以權謀私行為的發生,包括建立健全和嚴格執行各種日常工作中的規章制度,建立工齡工資、激勵工資與提拔制度緊結合的激勵機制,大對以權謀私的懲處力度
  3. The high - power semiconductor quantum well ( qw ) laser is a kind of luminescence device with superior performance, it has longe - lived, low threshold current density, high efficiency, high luminosity and excellent monochromatic, coherence, directionality, etc. the high - power semiconductor laser is widely applied to the fields, such as military, industrial machining, communication, information processing, medical treatment, etc. the material ' s epitaxy is the foundation of the whole laser ' s fabricating, and it has important influence on the optics and electricity performance about the laser

    大功率半導體量子阱激光器是一種性能優越的發光器件,具壽命長、閾值電流度低、率高、亮度高以及良好的單色性、相干性、方向性特點,廣泛應用於軍事、工業工、通信及信息處理、醫療保健領域。材料的外延生長是整個激光器器件製作的基礎,對器件的光學和電學性能著重要的影響,生長不出優質的材料體系,獲得高性能的器件就無從談起,因此,材料的外延生長便成為了整個半導體激光器製作過程之中的重中之重。
  4. The polyester fibre of resisting bacterium is one without which people can t live in modern times, but how to restrain the bacterium propagating excessively and keep people in health is a most important goal that fabrics and clothing industry are striving for. fibre of resisting bacterium can kill the bacterium effectively with the ratio of more than 99 % and it can restrain microbes. the polyester fibre of resisting ultraviolet radiation is also widely used. with the decreasing of ozonospheres in the atmosphere, there are more ultraviolet radiation in the sunlight which do harm to our skin, especially for those men working outdoors, it is more important to think about the way to lessen the harm. the polyester of burning - resisting has attracted more attention at home and abroad and burning - resisting textiles has been advanced definitely by law in many countries. our nation has also made strict claims in some special areas, such as fabrics in vehiciles and vessels, decorative fabrics in hotels. the everlasting burning - resisting fibres and textiles are badly needed. infrared ray fibre is also a new functional one that can absorb and reflect infrared ray after being processed physically. it s functions include physical therapy wet - ejecting and bacterium - restraining. this warm - preserving material can absorb the emitting heat from our bodies, at the same time it can also absorb and reflect the needed 4 - 14 urn wavelength ultraviolet radiation and accelerate netaboiism. fibre of resisting infrared ray is important in military areas

    抗菌纖維具永久的抗菌性,對金黃色葡萄球菌、大腸桿菌殺菌率大於99 ,能抑制細菌繁殖,起到抗菌防臭作用;抗紫外線聚酯纖維的用途也是異常廣泛的,隨著大氣層中臭氧層的日漸稀薄,日光中的紫外線日益增,對人體皮膚形成極大危害,尤其對于長期從事野外工作的人,因此設法減少紫外線對人體的傷害顯得尤為重要;阻燃聚酯纖維則是一種倍受國內外人士切關注的纖維,紡織品阻燃在許多國家已明確法令規定,我國也逐漸在某些特殊使用范圍做嚴格要求,如車船內用紡織品,高級賓館的內裝飾織物,而且具持久性阻燃性的纖維和織物是現在更為需要的,真可謂用途非常廣泛;遠紅外纖維也是一種經過物理改性后具吸收並反射遠紅外線的新型功能性纖維,是一種具優良理療功能、熱應功能和排濕透氣抑菌功能的新型紡織材料及保溫材料,能吸收人體自身向外散發的熱量,吸收並反射回人體最需要的4 14 m波長的遠紅外線,促進人體的新陳代謝;抗紅外線纖維,則在軍事上著重要的作用。
  5. This product is used for that in order to reach even and effective desulfidation for rubber powder, put pulverous crosslinked rubber, softener, activator and water into the pot, heat hermetically and mix contlnuously, adopted key equipment for the technology of high temperature dynamic desulfidation

    該產品用於將粉末狀硫化膠與軟化劑、活化劑及水置於罐內,在連續攪拌下熱,以使膠粉達到均勻膠硫目地,是採用高溫動態脫硫新工藝的關鍵設備。
  6. Our factory by produces the air current spinning machine fitting product ( reeling thread, transfers cup, divides combs roller, pressure roller and so on ) primarily, while expands, the enhancementproduction scale, efficiency unceasingly, strives for the survival by the quality, does not hesitate the great riches to increase or to renew the equipment, purchases the domestic and foreign advanced precise numerical controls lathe, the processing center, the high accuracy grinder successively and so on hundred, causes the product quality and the processing craft has the good stability and thereliability

    工廠以生產氣流紡紗機配件產品(紡紗器、轉杯、分梳輥、壓輪)為主,在不斷擴大、提高生產規模、率的同時,以質量求生存,不惜重資增或更新設備,先後購進國內外先進的精數控車床、工中心、高精度磨床百余臺,使產品質量和工工藝具良好的穩定性和可靠性。
  7. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線碼體制的優點及研究現狀;其次研究了橢圓曲線碼體制的基本理論;第三,分析了橢圓曲線碼的安全性並介紹了鑰共享,,數字簽名橢圓曲線碼體制;第四,深入研究了特徵為2的限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa橢圓曲線碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線碼體制,包括ecdh , eces , ecdsa 。
  8. Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme. this system include : local key management module key server module encrypt / decrypt module winsocket module and other module, this system solve the problem of security communication in distributed multipoint multimedia conferences system effectively

    混合系統主要包括以下模塊:本地鑰管理模塊、鑰服務器模塊、和認證模塊、網路socket模塊、其它輔助模塊。本系統解決了基於voip技術的分散式網路多媒體會議系統中信息安全傳輸的問題。
  9. After particularly researched the cryptogram algorithm of des, rsa, ecc, with which the virtue and shortcoming of performance in practice using is analysed. through which a hybrid ecryptogram system based on the des and ecc is designed, and also the flow of this cryptogram is provided. with this cryptogram, the problems of conservation of key and velocity of operation which aroses from using des, rsa algorithm singly is it resolved, and the securities of the system is improved

    然後論文在詳細研究des 、 rsa 、 ecc演算法的前提下,分析了它們在實際應用中性能上的優缺點,進而,設計了一種基於des和ecc的混合體制,給出了演算法的實現流程,解決了單獨使用des 、 rsa演算法所帶來的鑰保存不方便和運算速度較慢問題,地提高了系統的安全性能。
  10. In this paper, the so preparing self - compacting concrete with low and middle strength using super fine mountain sand artifical sand and phosphorus slag is studied systemically. through the study the influence of the shape, the proportion of the dust and the grade of sand to the workability and the mechanical property of self - compacting concrete, it is found that super fine mountain sand artifical sand are not suit to prepare low and middle strength self - compacting concrete, but when they are combined and the additive and assistant band material are used, c20 - c40 high performance self - compacting concrete is prepared ; the corresponding additive is developed to solve the delamination caused by the low proportion of banding material ; the evaluating system for the workability of low and middle strength self - compacting concrete is built ; the controlling method for production, construction and curing was set up. and the result of the research is applied into several projects

    通過分析特細山砂和機制砂的顆粒形態、粉末含量、顆粒級配特性對自實混凝土的工作性能和力學性能的影響,發現特細山砂、機制砂不宜單獨用於配製中低強度級自實混凝土,宜將特細山砂和機制砂進行合理復配,並選擇合適的外劑和礦物摻合料,優化配合比設計,可生產c20 c40中低強度級自實高性能混凝土;研製開發出了具減水、保塑、抗離析功能的外劑,解決了中低強度級自實混凝土由於膠凝材料用量少而出現的離析、泌水問題;應用正交設計方法,對因素和水平進行合理選擇,確定了生產中低級自實混凝土的最優配合比;建立了中低強度級自實混凝土的工作性評價體系;提出了生產、施工及養護的質量控制技術方法。
  11. Is made by formating some special tracks or sectors on the floppy disk. it provides protection at very low cost, but it can be beaten by the " bit copy " programs

    採用特別技術,其強度可與各種比魅,能抵抗各種鑰盤拷貝工具,防止鑰盤被
  12. In year 2005, our new main plant was built in jiading district, shanghai. hugong valve factory has also recently employed 556 people, including 158 technical engineers and 3 senior engineers. we also have more than 10 workshops for precise casting, hot forging and stamping, welding, heat treatment, finishing, machining and assembly

    下設精鑄造熱鍛壓焊接熱處理精工裝配十多個車間擁數控工中心離子焊接機全自動氣體保護焊半自動真空熔焊機超頻真空熱處理車球專用數控車床高工專機理化和探傷設備各類工檢測設備300多臺套。
  13. In this thesis, the basic problem of network security, some correlative protocols and cryptology are discussed at first, math theory in point is also studied. especially, a sort of new matrix method of solving quadratic equation over gf ( 2m ) is given, which is the key of selecting random point over elliptic curves. no better solution has been found in related literature in the world. compared with ieee p1363 ' s method, it is easy to implement the software and obtain high efficiency, etc. then the basic operation of elliptic curve is debated and the steps of finding secure curve and basis point over gf ( 2m ) are presented. moreover, the encryption and decryption schemes of the ecc are designed and the security problem of ecc is also considered. in the end, ecc by koblitz curves are implemented

    文章首先討論了網路安全基本問題、網路安全協議和碼學;對相關數學理論進行了研究,特別是給出了一種新的求解gf ( 2 ~ m )上二次方程的矩陣法,而它是選取橢圓曲線上的隨機點的關鍵步驟,和ieeep1363的方法相比,它易於軟體實現、率高優點,在國內外相關文獻上還未見到更好的求解方法;接著討論了橢圓曲線的基本運算,進而給出了在gf ( 2 ~ m )上選取安全曲線及基點的步驟;文章還設計了橢圓曲線系統的方案,討論了橢圓曲線系統的安全性問題。最後文章就koblitz曲線系統進行了軟體實現。
  14. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通信數據系統,該系統將對稱演算法3des與非對稱演算法rsa相結合對數據,用公鑰演算法rsa和單向散列函數md5實現對文件的數字簽名,地實現了網路通信系統中的信息、數字簽名、身份認證功能,保證了發送方所發送信息的秘性、鑒別性、完整性及不可否認性。
  15. Automated fingerprint identification system ( afis ), a technology of fingerprint identification using computer, is of convenience high fields efficiency, security and reliability. it has been applied in many such as financial security, data encryption, electronically business and will play a more and more important role in our life

    自動指紋識別系統是基於計算機來進行指紋識別的技術,具方便、高、安全、可靠優點,在金融安全、數據、電子商務各個領域都得到了廣泛的應用,並將在我們的生產和生活中發揮越來越重要的作用。
  16. In this thesis, the database of gps vehicle monitor information management system is designed, the design of the man - machine conversation interface and the software of the database server, also the software of the mid - ware are accomplished. an improved and logical three layer structure framework is used to utilize the resource of the system efficiently, balance the load, and improve the expansibility of the system ; powerful oracle database is used as background database to provide high performance service to the system which has numerous users and large - scale ; encrpytion arithmetic of communication data is designed to ensure the safty of gps vehicle monitor information management system communication ; the usage of fire wall, system privilege management and data backup improved the safty of the information management system database ; high usability design is realized by oracle data guard ; optimization of the information management system made the whole gps vehicle monitor system persistent, stable and high quality

    本文針對原gps車輛監控系統響應速度慢、穩定性和安全性不高的不足,提出了一種以改進的三層結構體系為系統架構,以oracle數據庫為后臺的gps車輛監控信息管理系統設計方案,設計了gps車輛監控信息管理系統數據庫,完成了gps車輛監控信息管理系統人機界面、中間件及數據庫端的軟體設計。系統架構採用改進的三層結構體系,其邏輯結構清晰,利於系統資源的利用,均衡負載,提高系統的可擴展性;后臺數據庫採用功能強大的oracle數據庫,可以提供大規模、多用戶的高性能服務;通信數據的演算法利於確保gps車輛監控信息管理系統的通信安全;防火墻的使用、系統權限管理以及數據的備份和恢復利於提高gps車輛監控信息管理系統數據庫的安全性, oracledataguard的使用利於提高系統的可用性;系統的優化,為系統持續、穩定、高質量運行創造了利條件。
  17. In the process of designing and realizing the system, the author, through revising the kernel source code of linux " s system, resolved successfully the transparent embedding of vpn equipment, the support to various kinds of encryption identity algorithm, the driver of encryption equipment based on pci bus, the resource competition of encryption equipment, the automatic communication of the encryption keys, which give security n stabilityn high - efficiency and transparency to the total system

    在系統的設計實現過程中,作者通過修改linux操作系統的核心源代碼,成功解決了vpn設備透明接入問題、對多種認證演算法的支持問題、基於pci總線的設備驅動問題、設備資源競爭問題、鑰自動協商問題,使得整個系統具安全、穩定、高、透明特性。
  18. In this model, a local voice server is used to compound voice, broadcast voice, receive dual tone multi frequency ( dtmf ) code and perform concurrent working ; in the meantime, some mature internet technologies such as routing, virtual private network ( vpn ) along with thread technology are also used to carry out valid, reliable access to remote database

    在這個模型中,用本地的語音服務器進行語音的合成與播放、接收雙音多頻碼和實現并行工作,同時利用internet中成熟的路由及安全技術對異地數據庫進行和可靠的訪問,以獲得語音服務所需要的數據。
  19. Security constraints are consistent by modifying security constraint definition, and an effective classification assignment algorithm is given in this paper. we analyze the problem of inference channel and give solution to solve the problem during database analysis and design period. by analyzing the problems resulting from extending single - level transactions to multilevel transactions, we also give a multilevel secure transaction schedule algorithm based multiversion snapshot graph

    本文提出採用主從結構表的方法對blp模型以改造,使得改造后的blp模型具較高的可用性和安全性;通過修改安全約束的定義,使得安全約束之間始終是協調的,並給出一種高級分配演算法;討論了推理通道問題,給出了在數據庫分析、設計階段可以採用的對策;分析了事務從傳統的單級擴展到多級面臨的眾多難題,給出了一種基於多版本串列化圖的事務調度演算法;根據上述理論,開發了一個多級安全數據庫管理系統的原型系統。
  20. At present, the public security and traffic police computer network ’ s main technical measures taken to deal with the network security are the firewall, the security route, cryptographic application and etc. they are useful to prevent the unauthorized access to some extent, but the main hidden defect of public security and traffic police network is from the authorized users ’ mistake or vicious operation

    目前,公安交警計算機網路解決網路安全主要採取的技術手段防火墻、安全路由器、應用。它們對防止系統非法入侵一定的果。而交警網路的主要安全隱患是來自內部合法用戶的誤操作或惡意操作。
分享友人