助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   secure communications 的翻译结果: 查询用时:0.2秒
图标索引 在分类学科中查询
所有学科
电信技术
互联网技术
物理学
计算机软件及计算机应用
更多类别查询

图标索引 历史查询
 

secure communications
相关语句
  保密通信
     Packet Speech Secure Communications Base on G.729A and AES
     基于G.729A和AES的分组语音保密通信
短句来源
     Applications of New Storage FLASH in Secure Communications
     新型存贮器FLASH在保密通信中的应用
短句来源
     Proposal on a Secure Communications Service Element (SCSE) in the OSI Application Layer
     在OSI应用层上提议的一种保密通信服务元素
短句来源
     Newest Advances in Chaotic Secure Communications
     混沌保密通信的最新进展
短句来源
     Research on High Speed Chaotic Shift Keying Technology in Secure Communications
     保密通信中高速混沌键控技术的研究
短句来源
更多       
  安全通信
     Research and Implementation of a Mechanism for Web Services Secure Communications
     一种Web服务安全通信机制的研究与实现
短句来源
     Chaotic Encryption Scheme Based on Neural Networks and Its Application in Secure Communications of IPng
     神经网络混沌加密算法及其在下一代互联网安全通信中的应用研究
短句来源
     The IP-VPN technology is applied to provide secure communications for enterprises. According to the functions in the layered network architecture, three strategies can be used to implement it, i.e. are application layer(such as SOCKs), data link layer(such as L2TP, PPTP) and IP layer (IPSEC).
     虚拟专用网 (IP -VirtualPrivateNetwork ,IP -VPN)是解决企业利用公共网络实现内部数据安全通信的一种技术 ,根据其实现的方式在网络分层中所处的地位可分为应用层 (如SOCKS)、IP层 (IPSEC)和数据链路层 (如L2TP、PPTP)VPN三种。
短句来源
     Based on the analysis of the NIDS, the approaches of packet-filtering, processes-controlling, packet-confirmation and secure communications are adopted by self-protection agent (SPA) to improve the security of NIDS according to its technique feathers. The architecture and the detailed design of the SPA are presented.
     在分析了已有NIDS的技术特点的基础上,根据其特性引入了报文过滤、进程控制、报文确认和安全通信的思想,提出了面向NIDS的自保护代理(Self-protection Agent)的模型,并给出了SPA的体系结构与详细设计。
短句来源
     The article designs an efficient mechanism for web services secure communications,which transports identity validation token through SOAP header and is based on session mechanism.
     该文设计了一种利用SOAP消息头传递验证信息、基于会话的高效Web服务安全通信机制。
短句来源
更多       
  保密通讯
     Feedback Synchronization of Chaotic System with Application to Secure Communications
     混沌系统的反馈同步及其在保密通讯中的应用
短句来源
     At last some problems of chaotic synchronization in secure communications are studied.
     最后给出了混沌同步在保密通讯中存在的问题和发展前景。
短句来源
     in 1990 and the pioneer works of Pecora and Carrol, The theoretical research and applied study of the chaotic control and chaotic synchronization get the development at full speed. Various kinds of methods of the chaotic control come out one after another and people find the chaotic control and chaotic synchronization can be applied to a lot of fields such as secure communications, chemical, modeling brain activity etc.
     Ott等人提出了OGY方法以及Pecora和Carroll关于混沌同步的开创性工作之后,混沌控制与同步的理论研究和应用研究得到飞速发展,各种控制混沌的方法相继问世,并发现了混沌控制与同步可以在诸如保密通讯、信号处理、化学反应、生态和电力系统等领域广泛应用。
短句来源
     A linear output feedback synchronization approach for chaotic Genesio system with application to secure communications is described.
     本文对Genesio混沌系统 ,进行线性输出反馈同步 ,并实现了混沌同步保密通讯 .
短句来源
     The main distinctions between chaos and hyper -- chaos are described, and a new view point that hyper -- chaos is more applicable to secure communications than Chaos is obviously presented.
     阐明混沌与超混沌的主要区别,明确提出超混沌比混沌更适用于保密通讯的新观点
短句来源
  “secure communications”译为未确定词的双语例句
     The key element for VPN is to secure communications, and IPSec (IP Security) is a core technology that provides this protection.
     VPN的关键是通信安全,IP安全协议集IPSec(IP security)是提供这种安全的核心技术。
短句来源
     Unidirectional coupling Lorentz circuit for secure communications with digital signals masked by chaos
     单向耦合洛伦兹混沌遮掩保密数字通信电路
短句来源
     Transient Analysis of Chaos Driving Synchronization and Its Application in Secure Communications
     混沌电路同步的瞬态分析及在通信中的应用
短句来源
     CHAOTIC PROPERTIES OF NEURAL NETWORK AND ITS APPLICATIONS IN SECURE COMMUNICATIONS
     神经网络的混沌特性及其在加密通信中的应用
短句来源
     A New Chaotic Masking Method for Secure Communications Based on Chua's Circuit
     一种新的蔡氏混沌掩盖通信方法
短句来源
更多       
查询“secure communications”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  secure communications
Cryptographic processing is needed for secure communications, storage, and computations.
      
This paper discusses an approach and application of intelligence in the context of achieving ubiquitous, converged, and secure communications.
      
Introducing intelligence for managing, protecting, processing, and delivering information of mobile communication systems has been identified as the way towards ubiquitous, converged and secure communications.
      
Key challenges include secure and efficient software agent deployment, secure communications and the difficulties of developing and monitoring agent systems deployed across a network.
      
The paper tries to address and provide a general architectural solution to ensure secure communications for a typical message-oriented mobile computing system.
      
更多          


This paper presents a new type of public key cryptosystem. This new system provides both secure communications and digital signatures over an insecure communication channel. Even though some secret keys of the system may be known, the security of this system is unlikely to be broken and thus secure communication may continue even in this event.

本文提出了一种新型公开密钥保密通信方案。该方案利用现有不保密通信信道提供双用户或多用户之间的可靠的保密通信和数字签名。论证表明新方案的加密变换几乎是不可被破译的,整个系统的工作不会因部分秘密密钥的泄露而受到任何破坏。

When the sender and receiver of a secure communication system are not trust on each other, the cryptography has not only to solve the message signature problem of sender, but also to prevent the receiver from refusing having been some valuable information served. First, the paper proposes the idea of received signature. Then, a practical realization of received signature protocol is given. Also, the security of the protocol is analysed. Anyhow, the new protocol uses the trusted third party to ensure the...

When the sender and receiver of a secure communication system are not trust on each other, the cryptography has not only to solve the message signature problem of sender, but also to prevent the receiver from refusing having been some valuable information served. First, the paper proposes the idea of received signature. Then, a practical realization of received signature protocol is given. Also, the security of the protocol is analysed. Anyhow, the new protocol uses the trusted third party to ensure the security of the signature.

在收、发双方互不信任的保密通信系统中,密码技术不但要解决发方对数据的签字问题,还必须防止收方拒绝承认收到有效信息数据。本文提出了接收签字的概念,同时给出了一种具体实现接收签字的密码协议,并对其安全性进行了讨论。新协议引用了公证处作为签字可靠性的保证。

This paper presents a new, simple and practical type of public key crypto-system.This new system provides secure communication between bi-users and multi-users over an insecure communication channel. Since the public keys use big prime modular operation and the translation of the encryption and decryption use smaller prime modular operation, so it is convenient to realize this system. It is proved that this system is unlikely to be broken.

本文提出了一种新型的、简便、实用的保密通讯方案。该方案利用现有不保密通信信道提供双用户或多用户之间的可靠保密通信。由于公开密钥采用大素数模运算,而加密和解密变换却采用相对较小的素数模运算,故系统实现比较方便,在微机上能够很容易实现。论证表明该方案几乎是不可破译的。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关secure communications的内容
在知识搜索中查有关secure communications的内容
在数字搜索中查有关secure communications的内容
在概念知识元中查有关secure communications的内容
在学术趋势中查有关secure communications的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社