通信密碼 的英文怎麼說
中文拼音 [tōngxìnmìmǎ]
通信密碼
英文
signal code-
The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。At last this module is synthesized using 6s06dpdm technology library. 3, the algorithm used in key module to the performance of data security is thoroughly analyzed. considering both performance of enciphering and degree of complexity of realization, steam cipher algorithm is used
3 、對數據通信安全性起決定作用的加密模塊所採用的加密演算法進行了深入的分析,綜合加密性能和實現的復雜度的考慮,採用了流密碼的加密演算法。This article elaborated the code technology in the correspondence application, discussed in the discrete signal code process function, as well as code technology security use and error correction function
摘要本文論述了編碼技術在通信中的應用,討論了離散信號的編碼過程中的作用,以及編碼技術的保密用途和糾錯功能。Now it is used in cryptography and corrspording field, specially, men study wiretap channel of type ii with maintain secrecy corresponding
它在密碼學通信領域有著重要的應用,特別是在研究第二竊密通道( wire - tapchanneloftype )時它與保密通信有關。Uestc is in charge of the tdd downlink that bases on fpga. low density parity - check ( ldpc ) codes were first discovered by gallager in the early 1960s and recently have been rediscovered and generalized
低密度奇偶校驗碼( ldpc )碼是由gallager在1962年首先提出的一種糾錯碼,在沉寂了多年之後,最近又重新成為通信技術研究的熱點。Low density parity - check ( ldpc ) codes were first discovered by gallager in the early 1960s and recently have been rediscovered and generalized. this class of codes decoded with soft - in soft - out ( siso ) iterative decoding performs amazingly well
低密度奇偶校驗碼( ldpc )碼是由gallager在1962年首先提出的一種糾錯碼,在沉寂了多年之後,最近又重新成為通信技術研究的熱點。Chuang, isaac l., lieven m. k. vandersypen, xinlan zhou, debbie w. leung, and seth lloyd. " experimental realization of a quantum algorithm. " nature 393 ( 1998 ) : 6681
量子信息> , 《物理世界》雜志1998年3月號35 ? 57頁其中有很多有名的文章,介紹了有關量子信息的許多東西其中包括:量子通信,量子密碼,量子計算以及與之相關的改進方法。Quantum cryptology is a new method for secret communications. this new method utilizes the quantum nature of single photons. data can be transferred with a proven security via the protocols of quantum key distribution
量子密碼術是一種實現秘密通信的新方法,它利用單光子的量子性質,藉助量子密鑰分配協議可實現數據傳輸的可證性安全。For wireless communications, direct sequence code division multiple access ( ds - cdma ) techniques have received a great deal of attention due to the expectation of capacity increase, interference rejection capability, security, and so on. in a high data rate application such as multimedia services, however, the capacity of ds - cdma systems is limited by both the inter - chip, or inter - symbol interference
Cdma技術以其高抗干擾能力、高容量、高保密性等技術優勢在第三代移動通信系統中被廣泛應用,然而在高速數據業務中,嚴重的碼間干擾和符號間干擾會導致系統性能明顯下降。Although the long pn sequence modulation has been used widely in the military communication with the good secrecy performance and restraint of jam between symbols, there is scarcely any research of long pn sequence modulation signals. so it is significant to research the estimation of long pn sequence modulation signals
由於目前尚未有對長pn碼調制信號進行檢測和參數估計的研究,而長碼調制較好的保密性能以及抑制部分符號間干擾的優點,使其在軍事通信中有著較好的應用前景,因而此部分工作具有重要的意義。Traditional laser iff has poor security because of low frequency of laser beam coded pulse. this can be greatly improved when the pulses are modulated by continuous wave laser, but the power of this laser beam output is so low that it ’ s difficult to be detected and received by laser warning subsystem
傳統的激光敵我識別器激光編碼脈沖頻率低,通信保密性差,使用連續波激光器經調制后激光編碼脈沖頻率高,保密性好,但輸出激光功率較低,難以達到激光告警分機探測接收的要求。The technology of the text digital watermark is a cross marginal subject which relates to researches of cryptography, graphics, science of vision, chinese information processing, image processing, communications, and information security, etc and is a very new research direction in theory at present
文本數字水印技術是一個涉及密碼學、圖形學、視覺科學、中文信息處理、圖像處理、通信及信息安全等學科的交叉邊緣科學,目前在理論上是很新的一個研究方向。This is an important thing to keep in mind when using the " anonymous proxy " services available across the internet : how well can you trust them since you re sending usernames and passwords through their systems
在使用internet上的「匿名代理」時,記得這一點尤其重要:您正在通過它們的系統來發送用戶名和密碼,怎樣才能相信它們呢?With the rapid development of it and computer technology, information and communication securities become more important. quantum communication is one of the most important technologies, which is the combination of quantum mechanics and cryptography
隨著信息技術的飛速發展,信息安全與通信保密日益重要與突出。量子通訊是量子力學和密碼技術相結合的產物,是當今的熱點技術之一。Therefore, blys, its receptor or related antagonists may find medical utility in the treatment of b cell disorders associated with autoimmunity, neoplasia, or immunodeficiency syndromes. in this study, epo signal peptide sequence and hsblys gene were linked by soe method. the fusion product was cloned into eukaryotic plasmids. pcdna3, pcdna3. 1, pefneo, respectively. meanwhile, the epo signal peptide sequence was mutated so as to form a restriction enzyme cut site : bin i. thus the recombinant plasmid can be used as secreting plasmid expressing other gene
本實驗通過3 』端互補,進行引物延伸合成epo信號肽序列:信號肽和hsblys基因採用重疊延伸拼接法形成融合基因;融合基因分別插入pcdna3 . 0 、 pcdna3 . 1 、 pefneo真核載體:引物延伸合成信號肽時,利用亮氨酸同義密碼,將信號肽基因的倒數第二個密碼突變,在重組載體上的信號肽序列之後,形成bln酶切位點,使三種載體成為分泌表達載體。The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient
數字包裝器最被認可的形式是數字信封,這些代碼主要完成電子郵件的加密,把想打開信封而沒有正確數字密鑰的入侵者擋在外面,數字信封主要由通過密碼加密或軟體演算法加密的代碼組成,運載著能正確讓接收方識別發送方身份的數字簽名。In this paper, the application of spin chain in the quantum information processing is introduced, including the application in quantum cryptography, teleportation and quantum computation. spin chain can be used as quantum channel to transport quantum state, and can also be used to realize general quantum gate
介紹了自旋鏈在量子信息過程中的應用,包括在量子密碼和隱形傳輸中以及量子計算中的應用,自旋鏈可以充當量子通道用來傳輸量子態,自旋鏈也可以用來實現量子通用門。It is unconditionally secure ( i. e. secure against a spy who has sufficient time and computer power ), and needless of any private key exchange before the actual communication
量子密碼具有無條件安全的特性(即不會遭受擁有足夠時間和計算機能力的竊聽者攻擊的危險) ,而在實際通信發生之前,不需要交換私鑰。By theory and practice simulation, the several types of constant envelope modulation techniques are analyzed and compared, including theirs modulation principle, phase path, the modulated wave envelope, power spectrums, error bit rate and the influence of its power spectrums of the band - limited and non - linear, etc. especially we have researched the ijf - oqpsk modulation technique, and the performance of its inter - symbol interference and time jitter free, and its strongly resisting of spectral spreading
結合理論和實驗模擬結果,分析討論了衛星通信中的各種恆包絡調制技術,對它們的調制原理,相位路徑,已調波包絡,功率譜密度,誤碼性能,以及帶限非線性通道對其功率譜的影響等方面都作了研究和比較。特別研究了ijf ? oqpsk在消除碼間干擾和定時抖動方面的性能及其優良的旁瓣特性和抑制頻譜擴展特性。The failure of the cardholder to observe or follow any recommendation of the bank from time to time regarding the safety and secrecy of the card and the pin or the failure to report the loss or theft of the card or loss, theft or disclosure of the pin to a third party to the bank as soon as reasonable practicable upon discovery thereof shall constitute gross negligence
持卡人在保管此卡或該密碼方面未能遵守本銀行不時向持卡人建議之任何保管信用卡及或私人密碼措施,或未能在合理時間內及時通知本銀行有關信用卡遺失或被竊事宜或私人密碼被外泄予他人,可被視作為疏忽行為論。分享友人