communication security 中文意思是什麼

communication security 解釋
通信保密, 通信安全
  • communication : n. 1. 通訊,通知;交換;信息;書信,口信,通報。2. 傳達,傳授;傳播;傳染。3. 交通,交通機關;聯系,連絡(設備)。4. 【宗教】接受聖餐。
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. I felt very beneficial from the cathedra about the security of information made by shi lei ( the minister of communication )

    聽完了外聯部部長史磊學長作的信息安全性知識講座,我感慨頗多。
  2. Stressing the need for everyone to act responsibly to ensure not just their own information security, mr wong said the highly interconnected nature of the information world meant we were dependent to a large extent on each other to assure the security of our data and systems. " for instance, while e - mail is becoming a common and efficient way of communication, it also poses potential threats to all it touches. and a likely tangible consequence to any laxity in our information security could be a costly negative impact on the conduct of our e - business.

    王錫泉強調,每個人都有責任去保護自己及其他人的資訊安全,現今的資訊世界高度互連,意味我們彼此之間互相倚賴以保障我們的數據和系統的安全。他說:例如,電郵雖已逐漸成為普及和有效率的通訊方法,但它同時會對所到之處構成潛在威脅。假如我們對資訊保安馬虎了事,便有可能對我們的電子業務運作造成代價不菲的負面影響。
  3. Information communication security, beijing, china, nov. 11 - 14, 1997, pp. 217 - 222. 11 michels m, p horster. on the risk of discruption in several multiparty signature schemes

    最後,我們指出chen等人提出的方案不能抵抗內部攻擊的一個根本原因是在實際應用中,不能保證所有簽名者操作的「同時」 。
  4. The development of fieldbus technology made lonworks field bus outstanding in all kinds of fieldbus. this paper simply introduces some kinds of common using fieldbus and the important position and influence of lonworks fieldbus in all kinds of fieldbus, carefully describes the technology core of lonworks technology, puts great emphasis on the introduction of the development and design of public security node of intelligent district which adopts computer, communication and control technology, carefully designs the interfaces of hardware circuits. the public security node of intelligent adopts 8031 single chip as its main processor to complete the application program of user, which mainly collects, process and control all kinds of field signal, and neuron chip 3150 as its slave processor to communicate with other nodes on field network, which works under parrel slave a mode

    現場總線技術的發展使得lonworks技術脫穎而出,本文簡要介紹了常用的幾種現場總線的概況以及lonworks技術在現場總線技術中的地位和影響,對lonworks技術的技術核心:神經元晶元、 lontalk協議、 lonworks收發器、 lonbuilder及nodebuilder進行詳盡的描述;重點介紹了集先進的計算機技術、通信技術、控制技術為一體的智能小區安防節點的開發與研製,對節點硬體電路的各種介面進行了詳盡的設計。本文設計的智能小區安防節點採用單片機8031作為主處理器來完成用戶的應用程序,主要負責對各種現場信號進行採集、處理及控制,工作在并行從a方式下的神經元晶元mc3150作為從處理器,主要完成與現場網路上的各節點及中心控制室之間的通信工作。
  5. Among these, signature technology ensures participator ' s identification against malicious bugging and distorting, and plays an important role in protecting the security of networking communication

    其中數字簽名技術能夠確認參與者的身份,防止惡意的偽造、竄改,在網路通信安全方面起到重要的保護作用。
  6. The architecture of client / server based on transaction middleware is a typical kind of the distributed on - line transaction processing, becoming a major platform of enterprise information system, which offers communication of striding platform, loading balance, fault - tolerant and resumable ability, and strengthens a new generation middleware in common with 3 - layer architecture provided with the strong security, excellent management and high availability in common. numerous distributed system, different database and different network environment are closely linked up among an enterprise, offering the function of mutual operation on application layer

    基於交易中間件的c s結構是一種典型的分散式事務處理系統,成為構築企業信息系統的主流平臺,它提供了強大的跨平臺通訊、負載平衡、容錯及其故障恢復能力,並在這個基礎上進一步強化了安全性、可管理性和高可用性的新一代通用型三層結構平臺的中間件,把企業中眾多的異構系統、異構數據庫、不同網路環境緊密的聯系起來,並在應用層提供了互操作性的功能。
  7. Although these methods have their advantages respectively, there are some disadvantages in tracing efficiency, network flux control, communication security and subagent callback for these meth ods more or less

    這些方法各有所長,但本身在追蹤效率,網路流量控制、通信安全性和子agent的回收等方面都或多或少存在一些不足。
  8. When listening to mechanism of inferior public security to represent a report, should to it look communication, show the posture movement that oneself listen attentively to seriously in order to nod first class what match, the person that can ask in time to report to the very not clear problem in the report repeats, explanation, also can quiz appropriately, but the problem that should notice to carry is logical, unapt the train of thought that interrupts report of the other side

    聽取下級公安機關代表匯報時,應與之目光交流,配之以點頭等表示自己認真傾聽的體態動作,對匯報中不甚清楚的問題可及時要求匯報者重復、解釋,也可以適當提問,但要注重所提的問題合乎邏輯,不至於打斷對方匯報的思路。
  9. With the fleet development of mobile communication industry, the security and secrecy of information has been becoming more and more vital. nowadays, the security of communication is of great importance to confirm the safety of business information. on the situation that the mobile phone has been diffusely applied, the hidden safety troubles of mobile phone should not be ignored ( such as wire tapping, imitated handset station, blue teeth connection, in exchange with electromagnetic wave, the back door of handset, lost & stolen & lost control of mobile phone, safety of non - tone increment operation of mobile phone and cell phone virus )

    據統計,目前我國gsm網路[ 1 ] [ 13 ]已覆蓋全國絕大部分地區,用戶數已超過2 . 6億,並且還在高速增長;隨著手機應用的普及,手機存在的安全隱患及面臨的威脅日益突出(如主動竊聽、假冒機站、藍牙連接、電磁波交換、手機后門、手機被盜、丟失或短時失控、手機非話增值業務安全以及手機病毒等) ,手機安全問題已成為當前急需解決的重要問題。
  10. Design, manufacture and distribution of fire and security alarm panels, power supplies, and communication devices. headquarters in the united kingdom

    -生產銷售家用車用安防產品和消防報警設備,包括一氧化碳報警器煙霧報警器火災報警控制器等產品
  11. Abstract : in this paper, we present a series of important applications of blind signature to computer security communication, especially to electronic voting and electronic cash

    文摘:根據近年來國內外關于數字簽名的研究背景及進展,闡述盲簽名在計算機保密通信,特別是在電子貨幣等方面的一系列重要應用。
  12. Commercial banks utilize internet technology, network security technology, digital communication technology and database technology, all these computer technology to expand business, and to provide better service for customers. it has become an inevitable trend to push banking business on line, one of the representatives of web applications the banking industry will future develop

    商業銀行利用網際網路技術、網路安全技術、數字通信技術、數據庫技術和計算機技術,發展商業銀行業務,為客戶提供更好的服務,以網上銀行為代表的web應用已成為未來銀行業發展的必然趨勢。
  13. Communication security cp, pv2 hur ji - hoon. how may i help you

    通信兵何智勛請問您要哪裡?
  14. On the consideration of the important function of xml in message communication, security plan and the standard of digital signature in different granularity is given

    鑒于xml在消息通信中的重要作用,研究了不同粒度的安全方案和數字簽名標準。
  15. Moreover, in integrating the resources from different related departments and associations, the national information and communication security taskforce ( nicst ) has played a major role in launching the national i & c security infrastructure

    於此同時國家資通安全會報的成立,在整合有關部會資源,積極推動我國資通安全基礎建設上,扮演了相當重要的角色。
  16. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。
  17. Tcp ip and communication security

    協議與通信安全
  18. Power system control and associated communications - data and communication security

    動力系統控制和相關通信.數據和通信安全
  19. In a 1999 article in chinese military science, former fourth subdepartment director maj gen yuan banggen identified network building, network operation, and communication security as the key roles for units under his command

    原第四分部的主任袁邦根(音)少將在《中國軍事科學》 1999年的一篇文章中,把網路建設、網路操作和通信安全確定為他所指揮的部隊的主要任務。
  20. Because of development of intelligent, data remote administration and transmittal in some enterprises, it is necessary for us to research and develop data security products for them to meet the demands of communication security in networks

    又由於企業的智能化、遠程數據管理、傳輸越來越普及,所以很有必要開發企業數據安全產品,以滿足數據遠程通信安全的需要。
分享友人