解密器 的英文怎麼說

中文拼音 [jiě]
解密器 英文
decipherer
  • : 解動詞(解送) send under guard
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
  • 解密 : deciphering
  1. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調制完成對計算機輸出的控制信號加處理,將指令碼載送到一指定頻率點。終端收費控制調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據調送來的信號,送入cpu單元后,出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到控制用戶通道的管理。
  2. The fameg fs8101cssl is the state - of - the - art solution for low - cost, high - performance, usb1. 1 hostable with mp3 interface controller. it is designed for embedded usb mass storage class applications with ub1. 1 host specification compliance

    它集成了內嵌ice功能的高速8051內核e8051d ,高兼容性高性能的usb2 . 0控制標準的des tdes安全加引擎, sd卡介面以及plif介面等。
  3. To work well, digital envelopes require that a public key infrastructure is in place : without the correct digital key to decrypt the wrapper, an intruder can ' t view the message inside

    為了很好工作,數字信封需要有一個公開的鑰基礎設施:沒有正確的數字鑰對包裝,入侵者就不能看到裏面的信息。
  4. Do not enable failover decryption of a database that must remain inaccessible to

    和其他特權級別高的服務主體無法訪問的數據庫,不要啟用其故障轉移功能。
  5. And other highly privileged server principals to decrypt the database. credentials that are created by using

    和其他特權級別高的服務主體能夠對數據庫進行
  6. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加機制的研究,首先介紹了數字集群通信系統的安全保機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加過程及其鑰的選用和管理,特別介紹了端到端加;然後介紹了幾種常用的加演算法,通過分析其優劣,提出了端到端加決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加方案的設計,其具體過程為將經過數字信號送入加里,和以idea加演算法為基礎設計的碼流發生( ksg )產生的碼序列進行加運算,並且研究了此加過程的碼同步問題。
  7. Further analyses are given to some important parts of the secure email system, such as digital signature, encryption and decryption. the author also describes in detail how to realize them. in the third part, it is proposed to use ldap server for distribution of the certificates and use sasl authentication in secure email system to ensure information security

    對適于安全電子郵件的演算法從hash 、簽名到加、認證進行了比較分析;二是根據s mime協議提出了安全郵件系統的體系結構,對其重要的數字簽名、加部分作進一步的分析,給出了具體實現步驟並進行了實現;三是基於ldap協議設計了用戶證書和通信簿管理體系,建立了ldap服務客戶端數字認證模型,並進行了實現。
  8. It is responsible for deciphering class files and uploading into java virtual machine ; class verifier is used to the correct internal structure ; security manager is used to customize the access strategy and permission ; and ssl guarantees the data security during transmission. though modeling and testing a prototype system, experiment proved the correctness and efficiency of above design

    類裝載是java安全體系的第一道防線,它負責將類后裝入java虛擬機; class文件檢驗保證裝載的class文件有正確的內部結構;安全管理主要用於定製用戶對系統的訪問策略和訪問權限;安全套接字用來保證web傳輸安全。
  9. It discusses about the safe serial communication about long nc programs between the embedded terminal and the cnc machine tool, which is realized by adopting the way of dnc communication. after analyzing characteristics about some kinds of data encryption algorithm, the rijndael encryption is selected to realize cooperative product data ’ s storage in the server and transmission in internet on encryption manner

    在分析各種數據加演算法的特點后,選用了rijndael加演算法,實現了外協產品數據在服務上加存儲、在網路上加傳輸和在終端上被,並在終端與數控機床之間以dnc通訊方式實現長nc程序安全傳輸。
  10. Any cracker with a packet sniffer can grab the data off the wire and take the passwords

    帶有信息包嗅探的任何高手都可以從線路上抓取數據然後獲得碼。
  11. The whole system can be used widely not only as an independent specific system module, but also in the embedded system with cpu control. finally, the interface between microprocessor and rsa, or between rsa and eeprom is implemented to realize the whole system function. the design of iic part is depicted with verilog hdl

    Rsa演算法實現的軟核設計在應用上具有很大的靈活性和獨立性,在介面模塊的配合下可以作為系統中獨立的加運算部件,在微處理的控制下使用,可以作為獨立的專用系統來使用。
  12. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽web服務雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。
  13. In this article, two projects - " sqy - 15 encrypt subsystem of hospitalization insurance system " and " general image compress flatform " are combined to get a resolvent scheme to realize data encrypt and image compress based on digital signal processor ( dsp ) and application specific integrated circuits ( asic ). this article includes three key technologies in designing and realizing the data encrypt card and the image compress flatform. they are : ( 1 ) design of dsp application system ; ( 2 ) epld designing technology using vhdl language ; ( 3 ) pci interface technology

    本文結合「 sqy - 15醫療保險信息系統加子系統」和「通用圖像壓縮平臺」兩項目,提出了基於數字信號處理( dsp )和可編程專用集成電路( asic )實現數據加卡和圖像壓縮平臺的決方案,重點介紹了基於dsp的數據加卡和圖像壓縮平臺設計與實現中的三個關鍵技術: ( 1 ) dsp應用系統設計; ( 2 ) vhdl語言設計epld技術; ( 3 ) pci介面技術。
  14. Creates a symmetric decryptor object

    創建對稱解密器對象。
  15. A symmetric decryptor object

    對稱解密器對象。
  16. The client uses the session key to decrypt the token, and if the timestamp matches that from the authenticator, mutual authentication is considered successful

    客戶機使用會話收到的令牌,如果時間戳與認證中的時間戳匹配,則認為相互認證獲得成功。
  17. If the server is requested to do so, it will use the session key to decrypt the authenticator, extract the timestamp from within the authenticator, encrypt the timestamp with the session key, and send it to the client

    如果受到請求,服務將使用會話認證,從認證中提取出時間戳,再用會話鑰加時間戳,然後將其發送給客戶機。
  18. For the positive real function image encoded by double random - phase, the first random - phase mask placed in the blank can not serve as the key when the decrypted image is detected by intensity detector in the decrypting process

    摘要正的實函數圖像通過雙隨機相位編碼加以後,在過程中,用光強探測接收圖像時,位於空域的第1塊相位掩模不起匙作用。
  19. The most used technique is the encryption decipher technology, others include the identity authentication, firewall technology, router security, intrusion detection, emergency responds and restores technical, the honeypot technology and so on. while these technologies is under development, some of them is only single function, mutually independent, and difficult for the system administration. they cannot be trusted completely as the solutions to network intrusion behavior which emerges one after another increasly in the reality

    目前,決網路安全問題的主要技術手段有加技術、身份認證、防火墻技術、安全路由、入侵檢測、應急響應與恢復技術、蜜罐技術等,這些技術在發展的同時,也存在著功能單一,相互獨立,難于系統管理的不足,不能應對現實中層出不窮的網路入侵行為,所以單純依靠這些技術不可能滿足全部的安全要求。
  20. As people enjoyed the opening and sharing of network, they were also distressed about the problem of security. this paper mainly studies the security encryption technology of networks - based e - commerce systems. it analyzes the message encryption and digital signature process of client browser, and the message decryption and validation of merchant server in a integrated e - commerce system, and it also provides an application example

    本文主要研究基於網路環境的電子商務系統安全加技術,分析了一個完整的電子商務應用系統中客戶瀏覽端和商家服務端的信息加、信息、數字簽名、身份驗證,以及pki ( publickeyinfrastructure ,公開鑰基礎設施)機制、數字證書技術在這個過程中的功能,並給出了一個具體的實現例子。
分享友人