進行安全通信 的英文怎麼說

中文拼音 [jìnhángānquántōngxìn]
進行安全通信 英文
ssh
  • : 進構詞成分。
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : 通量詞(用於動作)
  • 進行 : 1 (開展) be in progress; be underway; go on 2 (從事) carry on; carry out; conduct; make 3 (...
  • 通信 : communication; communicate by letter; correspond
  1. Subjective aspect, argumentum the traffic cause trouble abearance is human two kind negligence circumstance scilicet the negligence of the fault the gist and overconfident negligence, versus judge the human foresight in abearance ability, criminal negligence the inside how the human diligentia in abearance onus problem adduced own notion, combining versus the abroad of mutually in reliance on " the axiom proceeded the rating. in the objective aspects, argumentum three components of the traffic cause trouble sin and the scope of the atmospher e terms of the road accident occurrence. in the aspect of object, point out the traffic cause trouble the object of the sin is a transportation safety

    主觀方面,論證了交肇事為人主觀上的兩種過失情形即疏忽大意的過失和過于自的過失,對怎樣判斷為人的預見能力、過失犯罪中為人的注意義務問題了探討,並對國外的「相互賴」原則了評價。客觀方面,論述了交肇事罪客觀上的四個構成要件和交事故發生的范圍問題。在客體方面,指出了交肇事罪侵犯的客體是交運輸
  2. This paper describes the components and structure of advanced signaling system : automatic train control system ( atc ), analyzes the function and classification of its three subsystems : ats, atp and ato, with emphasis on currently widely adopted atc system - quasi - moving - block signaling system, which works on coded digit track circuit, and discusses the operating principles of coded digit track circuit and the features of train control of quasi - moving - block signaling system

    號系統是確保城市軌道交列車運及提高運營效率的關鍵設備。本文詳細討論了應用於城市軌道交的先號系統? ?列車運自動控制系統( atc )的組成和結構,對其三個子系統:列車自動監控系統ats 、列車自動保護系統atp 、列車自動運系統ato的功能和分類了詳細分析和比較。
  3. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算機息系統體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態防禦以及協同平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流體系模型基礎上,提出了用於指導計算機息系統體系建設的動態縱深防禦體系模型; 2 )在對各種體系標準研究與分析的基礎上,引入了域和防護層次的概念,提出了息類別、威脅級別和保障級別的定義,闡述了計算機息系統分析的方法和要求; 3 )在體系模型和分析的基礎上,提出了管理及技術的分級要求,從而便於計算機息系統的設計以及產品的選型; 4 )設計並基本實現了用於保障上述體系動態協同能力的協同平臺。
  4. The java secure socket extension jsse enables secure internet communications with ssl tls. it provides an application framework - a java version of the ssl and tls protocols - complete with the full range of functionality including data encryption, server authentication, message integrity, and more

    Java套接字擴展( jsse )利用ssl / tls可以的internet,它提供了一個具有完整功能的應用程序框架一個java版本的ssl和tls協議,這些功能包括數據加密、服務器認證、消息完整性,等等。
  5. It ' s well known that the project documentations " storage and management have an very important effect on the development of all kinds of project, and as the information age is coming, network technology has been applied to this procedure gradually. this article mainly introduces the study and realization of a internet - based project documentation storage and management system which application programming frame is built with delphi6. 0 and sql server2000. based on the tcp / ip protocol, the system try to establish a c / s model with connection - oriented, dependable stream sockets and multithread technology to complete some especial data communications by networks, such as the files of project, directory of user, all self - defined commands or messages and their parameters, and so on

    本文所研究的《基於internet的項目文檔存儲管理系統》過delphi6 . 0和visualc + + 6 . 0相結合的開發平臺,結合sqlserver2000 ,將client server模式的數據庫技術和windowssocket網路技術集成,遵循tcp ip協議,同樣採用c s結構運於internet ,過服務器將處于各個不同物理位置的客戶機連接起來,形成一個交流平臺;其中,引入了目前國際上流的先管理控制方法? ?角色控制理論對用戶權限分配,使擁有相應角色的人具有相應權限;然後系統自動根據組織部門或用戶的設立在服務器端生成相應的網路「虛擬文件櫃」 ,使擁有相應權限的人可以對相應文件櫃中的文檔整理;再過多線程技術和windows套接字機制在tcp ip協議上實現了單個文件及目錄的傳輸。
  6. Information - theoretically secure secret - key agreement is the key to make perfect security. the models of unconditional security from quantum channels and noisy channels are two typical methods now. once the secret - key has been agreed over a public channel, one can use the key to encrypt messages by using one time pad

    現在常的做法是雙方使用有擾道或量子道建立無條件模型,然後在公開認證道上交互密鑰協商,雙方把協商之後的的密鑰作為雙方共享的密鑰使用一次一密體制保密
  7. Secure networking in j2me involves additional interfaces available for secure communication with web - based network services

    J2me中的聯網涉及到一些為了與基於web的網路服務進行安全通信而提供的額外介面。
  8. Management of internet key is a necessary condition to communicate security. the paper introduces internet key exchange protocol to provide key management. and finite state machine is use for the procedure of internet key exchange

    第六部分: hitemet的密鑰管理是用戶進行安全通信的必要條件,本文採用了hitemet密鑰交換協議ike ( hitemetkeyexchange ) ,本文採用有限狀態機來描述密鑰的協商過程。
  9. Relied on the project “ management system of the hydro engineering construction trade of tianjin ” ( msect ) of hcht, this thesis analyzes the national situation of engineering construction trade and the domestic and international network trade at present, expatiates the knowledge of engineering construction trade, discusses the tender review methods which are often used and sets the mathematic models for methods of tender review which are being studied, designs the structure models and application development in detail, at last describes the technologies being used in network security, information security and impartial supervision

    本文依託北京海策環科技發展有限責任公司承接的「天津市水利工程建設交易管理系統」開發項目,對國內工程建設交易的現狀和國際國內網上交易的情況了分析,對工程建設交易理論知識面闡述,對常用評標方法了對比研究,對在研評標方法了數學模型方面的探討,對系統的架構模型和應用開發了詳細設計和研究,最後對網路和公正監督等採用的技術了重點闡述。
  10. Distribution automation system is automation and supervising system which applyies modern electron, communications, computer and network technology to integrating distribution system real time information, off - line information, user information, electric network structural parameter and geographic information

    配電自動化系統是應用現代電子技術、技術、計算機及網路技術,將配電網實時息、離線息、用戶息、電網結構參數、地理集成,構成完整的自動化及管理系統。
  11. First researches the system of ipsec security protocol deeply, then discusses the problems of security in end - to - end communication, advances the idea of resolving problems in end - to - end security communication using ipsec

    論文首先對ipsec協議體系了深入分析,討論了端到端中的問題,提出了利用ipsec實現端到端的思想。
  12. Linux has been more and more widely used today, but the secure degree of linux is low, so in this paper, we produce a linux - compatible secure operating system, named slinux. its design object is in accordance with the requirements of the fourth level, i. e. structured protection level, of gb17859. for this purpose, we introduce such mechanism, as identification & authentication, mac, least privilege manage, trusted path, password management. object reuse, covert and channel analysis. furthermore, we have some innovation, introduce the mechanism of network security and audit

    本論文的研究目的是對linux增強,設計一個新的操作系統,即slinux操作系統,其設計目標是滿足gb17859第四級《結構化保護級》的需求,為此我們在原有linux操作系統的基礎上引入了標識與鑒別機制, mac機制,最小特權管理機制,可路機制,密碼處理機制,客體重用機制以及隱道分析機制,同時還了創新,引入了網路保護機制和審計機制。
  13. This essay firstly systematically introduces the theories and key technologies of vpn with the detailed presentation of the functions of safety manage central - - - - the automatic production and distribution of passwords, remote - controlled destroy of passive and active passwords, loading special data in air and special tracing of cell phones that are out of control. besides, the researchers has analyzed the contents and findings of similar researches both domestics and overseas with the emphases on the in - depth research of safety communication gateway in order to confirm a system model and carry out the macro - design. after that is the detailed introduction of the design realization of special information transportation

    本文首先系統地介紹了gsm移動保密專網的原理知識及關鍵技術,詳細介紹了管理中心的功能- -密鑰自動產生和分配、被動式和主動式密鑰遙控銷毀、專用數據空中加載、以及失控專用手機追蹤等,並且對國內外同類研究的內容和成果分析;重點對網關了深入研究,確定了一種系統模型並了總體設計,然後對其中專用息傳輸的設計實現重點介紹;本文還對管理中心的短消息網關與專用手機性能測試,測試結果表明該系統符合課題的各項技術指標,實現了網關的各項功能需求;最後,總結課題工作,對下一步系統完善和發展的內容提出了具體建議。
  14. The paper through to analyse the background, meaning and necessity for implement bidding & tender of online architectural design, through to discript and compare with different mode of domestic and international of application for bidding & tender in network, to propose a unique opinion of solution system which is ndbs mode for bidding & tender of online architectural design, the mode is to submit the whole course of bidding & tender of online architectural design from planning for bid, information issue, pre - qualification, call for bid meeting, tender submit, tender evaluation and confirm the solution to sign the contract in internet. the paper through to structure a bidding platform ( bdb. cn ), to analyse the funcation procedure of bidding and tender system of online architectural design, from the sight of bid invitor, bidder and tender evaluated angle, to link them closely. the paper carry on system design to ndbs mode, input and outut, the information and keep them, safety and data stored, the paper combine with online architectural desigh wenzhou huameng building ( railway station road 1 - 2 massif ) as an example of ndbs mode finally, the result of study indicate, bidding and tender of online architectural design is not only feasible technically, the procedure of bidding and tender accord wigh the law, but also it is unanimous in traditional bidding way, this implement the scheme can improve working efficiency greatly, reduce the cost of bidding effictives, make it standard science further, to realize a pualitative leap in the building management level

    論文過對實施網上建築設計招標投標的背景、意義及必要性分析,過對國內外不同模式招標投標網路應用的綜合敘述與比較,提出了具有獨特見解的系統的網上建築設計招標投標解決方案? ? ndbs模式,該模式是對建築設計招標投標過程從招標準備、息發布、資格預審、招標會議、標書遞交、評標決標到合同簽訂的網上解決方案,論文從構建網上招標平臺( bdb . cn )開始,對建築設計招標投標系統的功能流程分析,從招標人、投標人和評標人的角度出發,過對其在整個招標投標活動流程在網際網路中的無縫連接,使得過bdb . cn招標平臺,能夠達到建築設計招標投標各參與方的一網打盡。論文還對ndbs模式了系統設計,對輸入輸出、與數據加密和招標投標資料儲存設計,從技術的層面對該系統提出了解決的方案。論文最後還結合溫州華盟大廈工程(車站大道1 - 2 #地塊)的網上建築設計招標投標的實例,對ndbs模式了實證,研究結果表明,實施網上建築設計招標投標,不僅在技術上是成熟可的,在工作流程上是符合法律法規的,與傳統的招標投標方式也是一致的,而且能夠大大提高工作效率,有效降低招標投標成本,使得招標投標能夠更加規范、科學,實現建設管理水平的一個質的飛躍。
  15. This paper has introduced the principle of isakmp, a protocol used in dynamical key exchange, and has accounted for the theory of ipc ( inter - process communication ) and a kind of new socket type pf _ key, as well as their messaging activity and related operations. the paper has mainly analyzed the procedure of building messages in kernel and its communication with application, the methods of managing messages and sadb. finally, it has presented a design of ipc ( inter - process communication ) between kernel and application according to pf _ key protocol, which makes various users communicate with each other on different channels created dynamically

    本文簡要介紹了在ipsec中實現動態密鑰交換使用的用框架協議? ? isakmp的基本原理;詳細闡述了程間機制和pfkey協議的基本原理、消息為及相關操作;著重分析了系統內核消息構造及其與應用層的過程和系統內核處理消息、管理關聯數據庫( sadb )的方法;最終提出了利用pfkey套介面協議在系統內核與應用層之間,為不同的用戶對動態地建立不同的道的設計方案。
  16. The application may be a. helpful and innovational experiment. to each module and technology in the honeynet, for instance, data controlling, data analysis, data capture, virtual machine, intr is ion detection technique and secure communication technology, carry on detailed research and realize, provide intrision decetion source code. through this research about honeynet application in distributed denial of service, it have stated strong vitality on solve the new and old problem existing in network security

    研究了將人工智慧思想引入到蜜網中的可性?對人工神經網路中的經典演算法bp演算法在蜜網數據檢測和分析中的實際應用了詳細的剖析,了實現;可以認為是將人工智慧思想引入到蜜網中的一次有益的和創新的嘗試;對蜜網中的各個模塊和技術,如數據控制、數據分析、數據捕獲、虛擬機、入侵檢測技術和openssh技術等,了詳細的研究和實現,給出了入侵檢測部分功能的源碼。
  17. This research chooses gsm safety manage central communication gateway server ( a round - the - clock processing system that carries through information parse and information transfer with central server and special terminals ) as the developing environment to insure the safety of communication

    Gsm管理中心網關服務器是與中心服務器和專用終端息解析、息透傳的天候處理系統,確保順利
  18. According to some kinds of existed attacking methods that are aimed at the web system, the article discusses the feasibility to implement secure transmission tunnel on every layer in tcp / ip protocol, and the related secure protocol standard. and focusing on cryptography, the paper lucubrates the technology of secure transmission of information such as data encryption, digital signature, identity authentication and data integrality technology

    本文針對web系統中息傳輸所面臨的威脅,從保障網路傳輸的角度,系統研究了tcp ip各個層次上實現道的可性及相關的協議標準,圍繞密碼體制,對數據加密、數字簽名、身份認證、數據完整性控制等傳輸技術了深入的探討。
  19. Therefore, author not only pay attention to key distribution protocol research and implementation, but also attend to build up a wsn simulated application structure. choosing aodv routing protocol as under - communication protocol, combining data integration, cluster selection, cluster building and other techniques, author intend to realize wsn low - consuming network communication by various measures

    因此在本文中作者不僅對密鑰預分配協議實現,更模擬建立了一個無線傳感器網路實際應用的虛擬環境,選擇aodv路由協議作為低層協議,融入數據融合技術,簇首節點選擇和簇結構生成等技術,以達到低功耗技術探究與實現的目的。
  20. Finally, chaotic digital sequences were applied to secrecy comrnunication among ic card system. the system model was designed and a simulation analysis for the secrecy coininunication with computer was also given

    最後,從的角度考慮,提出將混沌數字序列應用於讀卡器系統的數據保密中去,並設計了實現模型,了計算機保密模擬模擬。
分享友人