通信保密技術 的英文怎麼說

中文拼音 [tōngxìnbǎoshù]
通信保密技術 英文
private communication technology
  • : 通量詞(用於動作)
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 名詞(技能; 本領) skill; ability; trick; technique
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • 通信 : communication; communicate by letter; correspond
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了息加以及各國立法對的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. This article elaborated the code technology in the correspondence application, discussed in the discrete signal code process function, as well as code technology security use and error correction function

    摘要本文論述了編碼中的應用,討論了離散號的編碼過程中的作用,以及編碼用途和糾錯功能。
  3. In those studying works, nano - composites of polymer were prepared for electromagnetic screening and transparent in military electronic units 、 apparatus 、 weapon equipments, electronic cabinets, to keep communications secrets for important offices 、 laboratory, designing technologic routes of inorganic nanoparticle / nano - composites of polymer, nano - stannum oxide, nano - indium stannum oxide were prepared

    本課題的研究針對軍用電子元器件、部件、武器裝備、方艙、、重要辦公室、實驗室需要透明同時防電磁波泄露的需求,採取無機/高分子納米復合路線,研製納米氧化錫、氧化銦錫/丙烯酸酯類聚合物納米復合材料。
  4. Some features of this chip are listed below : firstly, it opts for ir data transmit technology, so it have the advantages of little emi, simple operation, low cost, etc. secondly, the synchrony method makes it have good noise suppression and ber quality

    該「紅外名片交換專用晶元」能獨立完成名片交換和管理的任務,具有顯著優點: 1採用紅外數據的方式,具有方案成熟,交換方法簡單,性好,相互電磁干擾小,成本低、簡單易用等優點。
  5. As a new branch of information security, information hiding technology including digital watermarking and steganography aims to protect intellectual property rights of multimedia contents and to send secret messages under the cover of a carrier signal

    息隱藏是息安全領域中的一項新興,主要有數字水印和數字寫兩大分支,分別用於多媒體數據的版權護和隱蔽
  6. 2 ) in the field of chaos secure communication, chaos synchronization is a key technology

    2 )混沌中,混沌同步是一項關鍵
  7. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算機息系統安全體系模型和實施標準的不足,本文緊圍繞分層、分級、動態防禦以及協同平臺等關鍵開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算機息系統安全體系建設的動態縱深防禦安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全防護層次的概念,提出了息類別、威脅級別和安全障級別的定義,闡述了進行計算機息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全的分級要求,從而便於進行計算機息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於障上述安全體系動態協同能力的協同平臺。
  8. The wireless channel based on spread spectrum modulation can assure the digital video signal communication safe and withstanding the high noise disturbing condition

    而基於擴頻的無線道,為視頻的傳輸提供了及抗干擾性能強等優點。
  9. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權護方法,另外系統在網路環境下的息安全問題也日益顯露出來.數字圖像水印為上述問題提供了一個潛在的解決方案.所謂水印就是將數字、序列號、文字、圖像標志等版權息嵌入到多媒體數據中,以起到版權護、秘、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  10. The information gained by the eavesdropper through interception is a very important criterion for judging the success of the key transmission and a necessary parameter for the privacy amplification

    竊聽者過竊聽所獲取的息量是決定鑰傳輸是否成功的重要指標,同時也是增強這一環節的必要參數。
  11. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依據;電子文件歸檔管理層中的主要任務是要建立起嚴的歸檔制度,同時結合「文件生命同期表」建立檢驗措施證電子文件在歸檔過程中息內容的原始性、真實性;電子檔案管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,過對電子檔案載體的維護、建立電子檔案維護管理的息文檔等工作,確管期限中的電子檔案持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性護體系安全控制,過對系統工作人員授權分散化、建立用戶標識與認證等措施確護體系」安全運行;加強「護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對護電子文件、電子檔案息原始性、真實性有著重要意義。
  12. Digital watermarking is the technology which embeds copyright information including product id, text content or image logo into multimedia for copyright protection, secret communication and discrimination of the data files

    所謂數字水印就是將數字息如產品序列號、文本內容、圖像標志等版權息嵌入到多媒體數據中,以起到版權護、秘、數據文件的真偽鑒別等作用。
  13. For wireless communications, direct sequence code division multiple access ( ds - cdma ) techniques have received a great deal of attention due to the expectation of capacity increase, interference rejection capability, security, and so on. in a high data rate application such as multimedia services, however, the capacity of ds - cdma systems is limited by both the inter - chip, or inter - symbol interference

    Cdma以其高抗干擾能力、高容量、高性等優勢在第三代移動系統中被廣泛應用,然而在高速數據業務中,嚴重的碼間干擾和符號間干擾會導致系統性能明顯下降。
  14. With the rapid development of information and communication technology, people attach more importance to the information & correspondence security, especially to network security

    隨著息與的飛速發展,息安全、尤其是網路安全日益受到了人們的重視。
  15. With the rapid development of it and computer technology, information and communication securities become more important. quantum communication is one of the most important technologies, which is the combination of quantum mechanics and cryptography

    隨著的飛速發展,息安全與日益重要與突出。量子訊是量子力學和相結合的產物,是當今的熱點之一。
  16. In communications, a cryptographic technique where the sequence of characters or bits is changed by means of a secret transformation

    中的一種加。它用轉換的方法改變字元或二進制位。同cryptography 。
  17. This essay firstly systematically introduces the theories and key technologies of vpn with the detailed presentation of the functions of safety manage central - - - - the automatic production and distribution of passwords, remote - controlled destroy of passive and active passwords, loading special data in air and special tracing of cell phones that are out of control. besides, the researchers has analyzed the contents and findings of similar researches both domestics and overseas with the emphases on the in - depth research of safety communication gateway in order to confirm a system model and carry out the macro - design. after that is the detailed introduction of the design realization of special information transportation

    本文首先系統地介紹了gsm移動專網的原理知識及關鍵,詳細介紹了安全管理中心的功能- -鑰自動產生和分配、被動式和主動式鑰遙控銷毀、專用數據空中加載、以及失控專用手機追蹤等,並且對國內外同類研究的內容和成果進行分析;重點對安全網關進行了深入研究,確定了一種系統模型並進行了總體設計,然後對其中專用息傳輸的設計實現進行重點介紹;本文還對安全管理中心的短消息安全網關與專用手機進行性能測試,測試結果表明該系統符合課題的各項指標,實現了安全網關的各項功能需求;最後,總結課題工作,對下一步系統進行完善和發展的內容提出了具體建議。
  18. At the mean time, the building of the system is the fastest and the best convenience. the scdma making use of radio connection technology of scdma have advantage of high radio frequency ratio, good secrecy and long distance of transport under lower transmitter frequency

    Scdma無線接入系統採用同步碼分多址( scdma )無線接入,具有無線頻譜利用率高、性好和低發射功率下較遠的距離等優勢,是一種優秀的無線接入
  19. With the development of information technology and internet, net communication, satellite communication, all kinds of conference call and in some special conditions, like underwater acoustic communication demand it more reliable and can keep secret and be low probability of interception. because of the effect of multipath and doppler shift, the signals through the channel fade rapidly

    隨著人類向息網路時代的邁進,網路、衛星、各種電話會議以及某些特殊的場合(如水聲)中都對、低截獲率和可靠性提出了更迫切的需要和更高的要求。
  20. The spread spectrum technology has got wide usage upon communications, telemetry, and orientation because of its strong anti - interference ability, low probability of being intercepted and captured, strong discrimination ability, outstanding multi - access communication ability, and excellent secrecy

    直擴由於具有很強的抗干擾能力、很低的被截獲概率、很高的距離鑒別力、良好的碼分多址能力和很好的性等特性,在軍事民用和遙測、定位領域得到了廣泛的應用。
分享友人