計算機密碼術 的英文怎麼說

中文拼音 [suànshù]
計算機密碼術 英文
computer cryptography
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : machineengine
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、、防火墻系統、審和恢復、操作系統安全、數據庫系統安全、病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Facial representation and recognition is one of the key issues in pattern recognition, computer vision, and image understanding fields. it is widely applied to numerous commercial and law areas, such as mug shots retrieval, real - time video surveillance, security system and so on

    人臉的表示和識別技是模式識別、視覺和圖像理解系統的研究熱點之一,在公安和安全部門有著廣泛的應用,例如搜索罪犯、動態監視、銀行系統等。
  3. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電子郵件服務系統中存在的安全隱患,基於對目前國內外電子郵件安全技的分析研究,立足於現有軍事網路的實際現狀,根據目前軍隊的辦公模式、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、管理的應用需求等進行了詳細的分析和設
  4. Public key cryptography is computationally intensive because it is based on complex math

    由於公鑰基於復雜的數學理論,所以它是十分耗費資源的。
  5. Elliptic curve cryptosystems on reconfigurable hardware information security technology is a compositive subject, which includes information theory, computer science, cryptography and other aspects fields. it aims to research the protection method of information, which are transferring in the computer system and communication network. also it is responsible to the security, secrecy, verity and integrity of the information

    信息安全技是一門綜合的學科,它涉及信息論、科學和學等多方面知識,它的主要任務是研究系統和通信網路內信息的保護方法以實現系統內信息的安全、保、真實和完整。
  6. Larry loeb has written for many of the last century s major " dead tree " computer magazines, having been - among other things - a consulting editor for byte magazine and senior editor for the launch of webweek

    即使是相當簡單的和相當短的消息,加擾和解擾一條消息也很費時間。然後出現了(在的首要使用中表將用得很多) 。
  7. Besides, this paper studies the wireless optical code division multiple access ( w - ocdma ) technology whereas its anti - jamming, security and asynchronism. based on the w - ocdma communication technology, we analyzes ocdma mac protocol, studies the protocol theory, access mechanism in detail, and models the throughput performance, simulates and analyzes the performance

    ( 3 )鑒于無線光分多址( wirelessopticalcodedivisionmultipleaccess , w - ocdma )技的抗干擾、保和隨異步接入的優點,本文分析了基於ocdma接入的無線光局域網mac協議,闡述了協議原理和接入制,用馬爾可夫模型對吞吐量性能進行了建模和模擬
  8. Hongkong post and utimaco safeware join hands to provide pki technical training to hong kong in a ceremony today ( 29 june ), hongkong post and utimaco safeware jointly announced the co - operation between the two parties in providing pki technical training in hong kong

    香港郵政與奧迪馬歌保安系統今日(六月二十九日)舉行儀式時宣布雙方將會攜手合作,在本港提供公開匙基礎建設(公匙基建)技培訓。
  9. With the development of the internet, the security of computer security is playing an important role. one means of providing security in communications is though encryption

    隨著聯網的逐步普及,信息的保問題顯得越來越重要。數據保變換,或,是對信息進行保護的最實用和最可靠的方法。
  10. Finally, the paper systematically study the problem of how to apply modern cryptography to system of secure electronic transaction, and bring forward an idea of combination of selective multi - algorithm of encrypting and decrypting, accomplish the design of the security mechanism and the comprehensive model of encryption applied to system of secure electronic

    最後系統地研究了如何將現代學技應用到電子交易系統中的問題,提出了一種多演法可選擇的組合加解思想,完成了電子交易系統的安全制和系統加模型的綜合設
分享友人