電算加密 的英文怎麼說
中文拼音 [diànsuànjiāmì]
電算加密
英文
analytical aerotriangulation-
We have calculated one - and two - photon absorption cross sections of the lowest excited states of a series of molecules combined with benzene, stilben, thiophene as center attached with amine, diphenylamine, diethylamine as electron - donor and nitryl as electron - acceptor ; the effects of molecular length, n center and electron - donor on two - photon absorption cross sections have been studied and all calculations have been carried out using the density functional theory at an ab initio level. it is found that the molecular length and the one - photon absorption intensity are quite strongly c orrelated factors, and that a corresponding correlation for the two - photon absorption is decreasing. it is also found that a most crucial role for the two - photon absorption is played by the n center
我們分別以苯、二苯乙烯、噻吩為中心,氨基、二苯氨基和二乙氨基為電子給體,硝基為電子受體組合形成的分子為研究對象,在從頭計算的水平上用密度泛函理論計算了這些分子在低激發態下的單、雙光子吸收強度,重點研究了分子的長度、中心和給體的供電子能力對分子單、雙光子吸收的影響。研究結果表明,分子長度與單光子吸收強度之間有密切關系,而在雙光子吸收中這種關系較弱;中心在雙光子吸收中具有重要的作用;在中心和受體一定的情況下,增加給體的供電子能力,可提高雙光子吸收強度。Wireless communications are easy targets for air wave interception, and wireless devices rarely have the computing power to support strong encryption of all communication data
無線通信是無線電波攔截容易獲取的目標,而無線設備幾乎沒有任何計算能力來支持所有通信數據的強加密。Having been studied and analyzed by cryptologist for over 10 years all over the world, pgp algorithm has been regarded as of security, high efficiency and operability. consequently, series of pgp ' s standard for application to protect e - mail came out. now a great deal of pgp ' s commercial software or free software has been developed
經過十多年世界范圍的應用研究和密碼分析家們的分析, pgp被認為是安全、高效和易於實現的加密演算法,形成了應用於保護電子郵件的一系列標準,並且有相當多的商業軟體和免費軟體被相繼開發。When performed the cryptographic computation, the smart card will leak information, namely timing of operations, power consumptions, electromagnetic emissions, etc. power analysis attacks use this information to break the secret key
晶元在執行加密運算時硬體本身會泄露一些信息,如能量消耗、電磁輻射等。能量分析攻擊利用此信息進行分析,便可獲得和密碼相關的一些有用信息。The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient
數字包裝器最被認可的形式是數字信封,這些代碼主要完成電子郵件的加密,把想打開信封而沒有正確數字密鑰的入侵者擋在外面,數字信封主要由通過密碼加密或軟體演算法加密的代碼組成,運載著能正確讓接收方識別發送方身份的數字簽名。In the application of pmos - 2000 system, the author carried out a hybrid encryption protocol with is suitable for information security transmission in electricity market with des, rsa and md5. with the pattern characteristics of pmos - 2000 power market operator system, and analyzed and compared with other encryption system, the author puts forward an implementing method, operational process and system structure of information encryption technology used in pmos - 2000, and the operating effects and projects which need further research and discussion were finally given. the research of this dissertation applied information security technology in power system project, which made it possible for information security transmission
在pmos ? 2000系統的應用中,作者利用des對稱加密演算法、 rsa非對稱加密演算法、 md5數字簽名演算法實現了一套適合電力市場信息安全傳輸的混合加密體制,結合了pmos ? 2000發電市場技術支持系統的模式特點,通過與別的加密體制的分析比較,把混合加密體制應用於pmos ? 2000系統之上,並提出了這套加密系統在pmos ? 2000電力市場技術支持系統中的實現方法、運作過程和系統體系結構,最後給出了它的運行效果以及進一步可研究和探討的方案。By the algorithm, we can make our life more automatical. encryption techniques of digital images are very practical and crucial techniques. this thesis makes a depth research on these two fields, and its major contributions are as follows : 1st
數字圖像加密技術是隨著計算機網路多媒體技術和現代電子商務的不斷發展,在機要、軍事、政府、金融和私人通信等領域中逐漸形成的一項非常實用又亟待快速發展的關鍵技術。Further analyses are given to some important parts of the secure email system, such as digital signature, encryption and decryption. the author also describes in detail how to realize them. in the third part, it is proposed to use ldap server for distribution of the certificates and use sasl authentication in secure email system to ensure information security
對適于安全電子郵件的演算法從hash 、簽名到加密、認證進行了比較分析;二是根據s mime協議提出了安全郵件系統的體系結構,對其重要的數字簽名、加密和解密部分作進一步的分析,給出了具體實現步驟並進行了實現;三是基於ldap協議設計了用戶證書和通信簿管理體系,建立了ldap服務器客戶端數字認證模型,並進行了實現。The two - dimensional axisymmetric subsonic - transonic - supersonic flow in an experimental arcjet thruster is simulated numerically using flux vector splitting method. the profiles of density, velocity, temperature, pressure and mach number can be obtained by the computation. the computation grid and some computed results are given here. the test equipment such as power supply system, ignition system, propellant supply system, arcjet thruster, thrust measuring device and vacuum system are introduced briefly. some working phenomena of the arcjet are observed and discussed. three different kinds of instability appeared in the process of the experiments. except some important parameters are measured, it is found that the operating stability of argon is better than that of nitrogen
對一實驗電弧加熱式發動機二維軸對稱亞跨超音速流動進行了數值模擬,所採用的方法是矢通量分裂演算法.通過計算可以得出密度、速度、溫度、壓力和馬赫數的分佈.給出了計算所使用的網格和一些計算結果.簡要介紹了實驗所使用的設備,如電源系統、點火系統、推進劑供給系統、電弧加熱式發動機、推力測量裝置和真空系統.對所觀察到的一些工作現象進行了討論.有三種不同的不穩定性出現于實驗過程.除了所測量的一些重要參數,通過實驗發現氬比氮工作更穩定It particularly analyzes the encryption algorithms to choose a perfect frame, and makes good use of the advantages of rsa algorithm and des algorithm, so that the whole system obtains a credible guarantee of its security
進行了詳細的演算法研究及選型,合理運用了rsa和des演算法的優勢互補,從而為整個應用系統提供了可靠的安全性保障。論文完成了信息加密系統的軟體演算法的詳細設計和硬體電路的搭建。Chapter 2 describes all aspects of conditional access systen in dvb architecture including struct, principium, encrypt arithmetic, dvb simulcrypt and common interface
第二章在dvb規范下論述了數字電視條件接收系統的結構和原理、加密演算法、 dvb同密規范和通用介面規范。Iso10126 - 2 - 92 banking. procedures for message encipherment wholesale. part 2 : dea algorithm
銀行業務.電文加密大宗程序.第2部分: dea演算法The relevant program of both the dongle and the computer have also been developmented. a parallel port and a serial port are provided for the pcb. there is a program ( in vhdl, vhsic hardware description language ) carrying out in the pld which implementi ng the parallel protocol. an encrpt arithmetic is designed and embeded in pld. to providing a interface for the user, a dll ( dynamic link library ) is developmented in c + + builder
所設計的電路板上可以選擇連接串列口或者并行口,在pld內用vhdl ( vhsichardwaredescriptionlanguage ,硬體描述語言)實現了並口的通信協議和一個自行研製的密碼演算法,並在c + + builder環境下開發了配套的上位機軟體,主要是提供了dll (動態鏈接庫)和一些函數用於pc機和加密鎖之間進行通信。Through combining the simultaneous ot protocol and the encrypted circuit construction, obtain a non - interactive secure function evaluation protocol
組合該並發ot協議與加密電路構造,得到一個非交互保密函數計算協議。Automated fingerprint identification system ( afis ), a technology of fingerprint identification using computer, is of convenience high fields efficiency, security and reliability. it has been applied in many such as financial security, data encryption, electronically business and will play a more and more important role in our life
自動指紋識別系統是基於計算機來進行指紋識別的技術,具有方便、高效、安全、可靠等優點,在金融安全、數據加密、電子商務等各個領域都得到了廣泛的應用,並將在我們的生產和生活中發揮越來越重要的作用。Pgp ( pretty good privacy ) is popular cipher algorithm applied to protect e - mail nowadays in the world
Pgp ( prettygoodprivacy )是當前世界流行的用於保護電子郵件的加密演算法。During the last 10 years, with the acquisition of much valuable intensive observations in a series of typhoon field experiments, the improvement of the weather monitoring network, the upgrade of atmospheric numerical models and the rapid development of computer powers, many problems in typhoon heavy rainfall research are further studied, such as the interaction between typhoons and mid - latitude weather systems, the interaction between typhoons and topography and underlying surface, the mesoscales of typhoons and the dynamics and so on
近10年來,隨著我國一系列臺風外場科學試驗加密觀測數據的獲得、天氣監測網的逐步完善、大氣模式的改進以及電子計算機的飛速發展,臺風與中緯度系統的相互作用、臺風與地形下墊面相互作用、臺風中小尺度及其動力學等方面均得到深入研究。The research in software radio is not more than ten years, but has made a great many fruits, but it is too little to set up an integrated theory system, and software radio includes many areas such as modern communication system ( which includes modem source / channel encoding and decoding, equalization, encrypt and decrypt and so on ), wideband antenna theory, digital signal process, microelectronics, computer and so on. this thesis mainly does research for modem in modem communication
軟體無線電經過不到10年的研究,盡管取得了很多成果,但是對于建立一套完整的理論體系來說,還遠遠不夠,況且軟體無線電涉及的領域多、面廣、發展快,如現代通信理論(含調制解調、信源通道編解碼、均衡、加密解密等) 、寬帶天線理論、數字信號處理、微電子、計算機等。In this paper, against so many kinds of hazards in e - mail application, not changing the e - mail protocols in existence, we embed a good encryption algorithm, permutation code in the system to safeguard the information of e - mail, introduce public - key cipher to implement transfer of session keys safely, implement authentication and integrity of information, and introduce essential key management mechanism
本文針對電子郵件面臨的種種安全威脅,在不改變現有電子郵件協議的前提下,嵌入性能良好的排列碼加密解密演算法來保障郵件信息的安全,同時採用公鑰密碼體制來保障密鑰的安全傳遞,並實現消息的身份認證及數據完整性;還引入了必要的密鑰管理機制。Finally, the paper systematically study the problem of how to apply modern cryptography to system of secure electronic transaction, and bring forward an idea of combination of selective multi - algorithm of encrypting and decrypting, accomplish the design of the security mechanism and the comprehensive model of encryption applied to system of secure electronic
最後系統地研究了如何將現代密碼學技術應用到電子交易系統中的問題,提出了一種多演算法可選擇的組合加解密思想,完成了電子交易系統的安全機制和系統加密模型的綜合設計。分享友人