secure protocol 中文意思是什麼

secure protocol 解釋
安全協議
  • secure : adj ( curer; curest)1 安心的;不必擔心的;有把握的。 2 可靠的。3 安全的。4 堅固的;牢固的。5 必...
  • protocol : n 1 議定書;調查書,始末記。2 (條約等的)草案,草約;(羅馬教皇詔書等的)首尾程式。3 〈the P 〉 ...
  1. It satisfies the fundamental secure properties of the electronic cash system with multiple banks, and besides, the realization process of the scheme is easier than e - cash protocol based on the blind group signature

    該方案除滿足多銀行電子現金方案的基本的安全性質外,實現過程也比利用群盲簽名構造的電子現金協議簡單。
  2. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  3. Condor - g integrates condor ’ s eximious job management functions into globus ’ secure communication among domains protocol and standard remote batch process system access protocol, and help the condor users to use globus resources

    Condor把自身出色的作業管理功能和globus的域間安全通信協議及遠程批處理系統的標準化訪問協議相結合,就形成了condor - g軟體系統,使得condor系統的用戶也可以很方便的使用globus資源。
  4. Built upon the project designing voip terminal based on coldfire platform, my task is designing two protocol modules : the secure real - time transport protocol ( srtp ) and multimedia internet keying ( mikey ), and then implements them on target platform

    本課題是在「基於coldfire平臺的voip終端設計」項目背景下,設計並實現該項目中的兩個協議模塊:安全的實時傳輸協議srtp和多媒體網際網路的密鑰協議mikey 。
  5. In a word, by integrating the user " s fingerprint identification with the cryptological authentication protocol, a secure, reliable and effective approach to identifying the users in the network environment can be provided

    把以指紋特徵為代表的生物識別技術與基於密碼體制的身份認證協議有機結合,向最終用戶提供一種更加安全、可靠、便捷的身份認證手段,將是成功地實現網路安全和信息系統安全的有效途徑。
  6. The platform puts emphasis on the implementation of m - gdh. 2 protocol, and realizes such functions as follows : peer to peer network connection, dynamically displaying network topology, key generation, secure communication, help - online and so on

    該平臺以m - gdh . 2協議為開發重點,實現了網路對等連接、動態顯示網路拓撲結構、密鑰生成、安全通信以及聯機幫助等功能。
  7. Secure hypertext transport protocol shttp

    安全超文本傳輸協議
  8. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  9. The paper analyzes the secure problem existing in the tcp / ip protocol, discusses the possibility and superiority of secure transmission in network layer, researches the architecture of protocol ipsec, presents the design thought of using ipsec to realize the secure transmission within the pbc ' s intranet under the windows. the paper gives a schema of secure transmission system in the pbc ' s intranet, realizes it using the windows kernel program technology and obeying the specifications of ndis and ipsec. the secure transmission system promotes the secure extent of the pbc ' s intranet

    論文針對人民銀行內聯網面臨的信息和數據安全傳輸問題,分析了tcp / ip協議存在的安全問題,探討了在tcp / ip網路層實現安全傳輸的可能性和優越性,認真研究了ipsec協議體系結構和esp協議、 ah協議、 ike密鑰交換協議的原理,在既要保護已有投資,又要提高安全程度的前提下,提出了在windows操作系統下採用ipsec實現人民銀行內聯網安全傳輸的設計思想。
  10. In the research of secure communication, the thesis analyzes some shortcomings of diffie - hellman ' s crypt key exchanging protocol, presenting a new exchanging method based on the " station to station " protocol and cookie mechanism, realizing the software of crypt key exchanging and secure communication of ip datagram on router

    在對安全通信的研究中,本文分析了diffie - hellman密鑰交換協議中易受攻擊的地方,提出了基於端對端協議及cookie機制的密鑰交換新方法,並在路由器上實現了密鑰交換和ip報文的安全通信。
  11. The second part tracks the technology of information security and electronic security protocol which is advanced nowadays and will be applied in later sectors. the third part analyses secure demands of e - business and design general system frame of secure electronic business. the forth part analyses data flow and transaction process in the systems of electronic payment based on set protocol and ssl protocol distinctly, then designs them. systems of electronic payment consist of four logic parts, including client side, payment server, payment gateway, which is designed in fifth part

    本文從應用的角度出發,通過跟蹤研究國內外先進的信息安全技術和安全電子交易協議,對支付型電子商務業務及其安全需求作了詳細的分析;分別設計了基於set協議和non ? set協議的電子支付交易流程及系統中各組成部分(包括客戶端軟體、支付服務器、支付網關)的基本功能模塊,能較好實現商家、顧客、企業、銀行之間的信息流、資金流的傳遞及安全保障;接著就電子支付系統實現過程中的信息交換和系統集成等方面的問題作了探討,並給出了基於j2ee和xml的解決原型。
  12. The system performs the following basic functions in order to meet the requirements : provide security methods for interbank payments through internet, atm, telephone banking service etc. for customers ; provide mechanisms to enable the secure authentication of parties in the transaction ; provide access to multiple bank payment processing systems with one protocol ; transform a payment request into a bank payment transaction ; provide information for audit and control

    該系統的主要功能是為用戶提供網上支付、 atm 、電話銀行等安全支付方式;在交易中提供對交易雙方的安全認證方式;支持多種銀行支付處理系統;把支付請求轉化為銀行內部支付交易;提供審計和控制信息。
  13. Currently, security protocol is a hot research field in network security and has a very important effect for guarantee the network security. but, if the information has been displaced or modified by virus and trojan horse before encryption in that the transmitted information is invalid although the protocol is secure

    安全協議是當前網路安全領域的研究熱點,在保障網路安全方面起著重要的作用,但是如果信息在加密前被病毒、木馬程序替換或者篡改了,這樣雖然協議本身是安全的但是傳輸的信息已經失效。
  14. An integrated trust evaluation mechanism to support secure and transparent services across security domains is developed, and implemented in sip protocol. 3. partly design and code sso feature in sip which integrated simplized trust model including protocol sequences, relative data structure, and xml message format

    3 ) 、擴展sip協議,設計並部分實現了採用該信任評估模型而實現的sso策略:包括sip協議流程的擴展、相關數據結構和xml消息編碼格式。
  15. Ssl is the abbreviation of secure socket layer, which can implement secret transportation. the netscape corporation put forward the ssl protocol whose edition is 3. 0 now

    Ssl是securesocketlayer (安全套接層協議)的縮寫,可以在internet上提供秘密性傳輸。
  16. By applying the quantum computation language which is used in quantum computation to the research of quantum communication, the validity and security simulation of a typical secure direct communication protocol, and various performance indexes of it were achieved

    將一種用於量子計算模擬的量子計算語言引入量子通信的研究中,實現了一種典型的量子安全直接通信協議的正確性、安全性模擬驗證,並得到各種性育齡旨標。
  17. After strict formal analysis with ban logic, the result have proved that the authentication protocol is secure. the improved access control scheme is realized by the mode of single - key - lock - pair. under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method

    作為對原雙向認證訪問控制方案的改進,改進后的雙向身份認證協議可以很好的抵抗中間人攻擊和重放攻擊,經過嚴密的ban邏輯形式分析和論證,結果表明該協議是安全的;改進后的訪問控制方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案的良好動態特性外,在不需要訪問權限遞增假設下,實現了用戶對文件的多種訪問控制權限,並大大減小了溢出問題的發生可能
  18. Layer 2 tunneling protocol ( l2tp ), a more secure version of point - to - point tunneling protocol ( pptp )

    第二層隧道協議( l2tp ) ,是一種比點對點隧道協議( pptp )更安全的版本。
  19. This platform utilizes several techniques, including cryptographic algorithms, one - way hash function, digital certification, secure protocol, watermarkng and etc. based on this platform, a new authentication and key exchange protocol is presented and has been well applied to this transmission platform

    該傳輸平臺使用了多項技術,包括密鑰演算法、單項散列函數、數字證書、安全協議和數字水印等技術。針對該傳輸平臺,提出了一個新的認證和密鑰交換協議,並在傳輸平臺得到了很好的應用。
  20. According to some kinds of existed attacking methods that are aimed at the web system, the article discusses the feasibility to implement secure transmission tunnel on every layer in tcp / ip protocol, and the related secure protocol standard. and focusing on cryptography, the paper lucubrates the technology of secure transmission of information such as data encryption, digital signature, identity authentication and data integrality technology

    本文針對web系統中信息傳輸所面臨的安全威脅,從保障網路信息安全傳輸的角度,系統研究了tcp ip各個層次上實現安全通道的可行性及相關的安全協議標準,圍繞密碼體制,對數據加密、數字簽名、身份認證、數據完整性控制等信息安全傳輸技術進行了深入的探討。
分享友人