cryptographic communication 中文意思是什麼

cryptographic communication 解釋
密碼通信
  • cryptographic : 關于暗號的, 用密碼寫的
  • communication : n. 1. 通訊,通知;交換;信息;書信,口信,通報。2. 傳達,傳授;傳播;傳染。3. 交通,交通機關;聯系,連絡(設備)。4. 【宗教】接受聖餐。
  1. Quantum cryptography ( qc ) is the combination of classical cryptography and quantum mechanics. the characteristics of quantum mechanics, such as no - cloning theorem and heisenberg ' s uncertainty principle, provide the perfect secrecy for quantum cryptographic communication

    量子密碼學是密碼學與量子力學結合的產物,利用量子不可克隆定理和海森堡測不準原理等量子特性,量子密碼通信理論上已經證明是絕對安全。
  2. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。
  3. The quantum communication can be divided into two stages : in the first stage, the quantum communication is conducted and cryptographic key communication is finished through the quantum channel ; in the second stage, the negotiation of cryptographic key is achieved in order to measure whether any bug exists or not, and then confirms the final cryptographic key, at this time the quantum communication is accomplished

    在bb84協議中,量子通信實際上由兩個階段完成:第一階段通過量子通道進行量子通信,進行密鑰的通信;第二階段在經典通道中進行,主要負責密鑰的協商,探測竊聽者是否存在,然後確定最後的密鑰。
  4. Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties

    傳輸層安全協議( tls )和安全套接字層協議( ssl )基於對稱密碼技術、非對稱密碼技術、消息認證碼技術、公鑰證書和公開密鑰基礎設施技術提供了保證網路通信數據的機密性、完整性和對通信各方進行認證的機制。
  5. The thesis is structured particularly as follows : chapterl : firstly, the kinds and schematic of the cryptographic communication are introduced

    具體內容安排如下:第一章:簡要介紹了保密通信的類型和原理以及現面臨的問題。
  6. We lead by example, and uphold very high standards of security and data protection through our information security management framework. we make exemplary use of cryptographic technologies to facilitate secure communication among government users of it and with the general public

    在政府新一輪的電子政府策略中,我們將利用資訊科技提供以客為本的服務,讓市民得享更簡便易用的公共服務。
分享友人