鏈密加全安路 的英文怎麼說

中文拼音 [liànjiāquánān]
鏈密加全安路 英文
tunnel
  • : Ⅰ名詞1. (鏈子) chain Ⅱ動詞(用鏈栓住) chain; enchain Ⅲ量詞(計量海洋上距離的長度單位) cable length
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  1. ( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system

    特別是,論文作者在網系統建設的過程中,獨立承擔了中心子網防火墻、網入侵檢測系統、病毒防護體系的裝及管理工作,在詳細了解了ddn、 pki ca體系的建設和使用原理的基礎上,參與了網基礎設施的裝調試以及各類服務器的配置管理,擬定了《計算機信息系統管理規定》 、 《網ip地址規范》 ,為本單位網建設規劃提出了意見和建議。
  2. After the investigation of the general technology of hardware implementation, how to implement the kasumi algorithm using field programmable gate array ( fpga ) device is discussed in detail, and the author develops the cipher chip of kasumi algorithm, the kasumi cipher card based on 32 - bits pci bus, the wdm device driver that used in windows2000 / xp, and the software to demostrate encrypting data link. finally, an application demostration is constructed with all the above implementation

    在此硬體實現的結果晶元基礎上,設計了32位的基於pci總線的kasumi卡,編寫了windows2000 xp下的windows驅動程序模型( wdm )驅動程序和應用程序,由此構成一個應用演示系統,作為研製結果的應用評估,為進一步進行第三代移動通信系統相關技術研究和開發提供了基礎條件。
  3. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種服務和實現的課題,並通過一些具體實現的實例進行闡述,具體排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理、干擾情況、網拓撲結構以及核心協議等;然後介紹了通信的基礎知識,討論了osi系統中的四層網結構模型;最後給出了各種技術的基本理論,包括對稱體制如des和blowfish 、非對稱體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級標準( advancedencryptionstandard , aes )等。
  4. The initialisation key is the first security gate in bluetooth security system, if the initialisation key is got by attacker, the attacker will get the common link key by continue listening the communication. if the common link key is known by others, the two device is no secret before he. the third party can not only listen the two device ' s communication but also assert him one party to authenticate the other. pairing at place where less people here will reduce the attack. to use long pin managed by diffie - hellman key exchange algorithm will also reduce the attack

    初始字是藍牙系統的第一道屏障,如果初始字被攻擊者得到,攻擊者就可以通過監聽兩設備的后續通訊進而獲得兩設備的公共字,如果兩設備的公共字為第三方知曉,那麼兩設備對于第三方面而言就毫無性可言。第三方不但可以偷聽兩設備的通訊,還可以冒充其中一方向另一方鑒權。
  5. This paper first introduce the new technology bluetooth, then discuss the security of bluetooth at link layer including the management of link key ( classify 、 generate and transfer ) 、 pairing 、 authentication and encryption. at last discuss the security hole in bluetooth such as initialization key 、 unit key 、 authentication and bluetooth device address and the methods to solve the problem

    文中首先簡要介紹了藍牙這一新技術;接著討論了藍牙層的問題,包括字的管理(分類、生成及傳遞) 、配對過程、鑒權過程和過程。
  6. In chapter 2, the security measures and mechanism are introduced and studied. it mainly includes authentication, encryption, pairing / bonding, key management defined by bluetooth core protocol, three security modes defined by bluetooth profile and bluetooth security architecture defined by bluetooth white paper. in chapter 3, the implementation of secure services in bluetooth environment is studied deeply according to different scenarios

    在第二部分,本文闡述了藍牙技術中的機制和各種具體措施,主要包括藍牙標準對直接層的標準定義如鑒權、、配對/ bonding 、鑰管理等,藍牙應用規范中給出的三種模式以及藍牙標準白皮書的體系結構。
分享友人