助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   message encryption 的翻译结果: 查询用时:0.017秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
航空航天科学与工程
互联网技术
更多类别查询

图标索引 历史查询
 

message encryption
相关语句
  消息加密
     Design of SOAP Message Encryption Architecture
     SOAP消息加密架构的设计
短句来源
     Fourthly, considering the security feature of SNMP protocol in message encryption, authentication and access control, the security model of USM and VACM that are defined by SNMPv3 protocol are emphasized. Then the security of network management based on INMF in high-performance FPv4/IPv6 router is discussed.
     综合分析了SNMP协议在消息加密、认证和访问控制方面的安全特性,重点研究了SNMPv3协议定义的USM和VACM安全模型,深入探讨了基于INMF的高性能IPv4/v6路由器网络管理安全策略。
短句来源
     The author researches into the encryption of SOAP message and designs in detail the system framework of SOAP message encryption so as to guarantee the confidentiality of Web message transfer.
     通过对SOAP消息的加密进行研究,从而在SOAP层详细设计了SOAP消息加密体系结构,以保证了Web消息传递的机密性.
短句来源
     The implementation version of the model can provide various security services, such as user authentication, message encryption and decryption, message digital signature and verification and access control.
     采用该模型实现的Web安全系统能够提供各种类型的安全服务,包括用户认证、消息加密/解密、消息数字签名/验证和访问控制等功能。
短句来源
     3)a new elliptic curve authenticated encryption scheme with message linkage recovery, which solves the problems such as message encryption and authentication, message linkage recovery and load of transmitting data.
     结合消息链接恢复特性,提出了相应的认证加密方案,该方案较好地解决了消息加密认证、消息链接恢复及传输量较大等问题。
短句来源
更多       
  信息加密
     Short Message Encryption Scheme Based on Signcryption Algorithm
     基于签名加密算法的短信息加密方案
短句来源
     This paper mainly studies the security encryption technology of networks- based E-commerce systems. It analyzes the message encryption and digital signature process of client browser ,and the message decryption and validation of merchant server in a integrated E-commerce system,and it also provides an application example.
     本文主要研究基于网络环境的电子商务系统安全加密技术,分析了一个完整的电子商务应用系统中客户浏览器端和商家服务器端的信息加密、信息解密、数字签名、身份验证,以及PKI(Public Key Infrastructure,公开密钥基础设施)机制、数字证书技术在这个过程中的功能,并给出了一个具体的实现例子。
短句来源
     The solution uses advanced network security technologies, such as physical isolation, desktop system security, virus protection, identity verification, access control, message encryption, undeniable, security audit, intrusion detection, loopholes scanning, electromagnetism leakage and emission safety and security management, to build a network security defense system which is integrated, comprehensive and multilevel.
     方案运用先进的网络安全技术,提出了包括物理隔离、桌面系统安全、病毒防护、身份鉴别、访问控制、信息加密、信息完整性校验、抗抵赖、安全审计、入侵检测、漏洞扫描、电磁泄漏发射防护、安全保密管理等安全技术和管理措施在内的一整套解决方法,目的是建立一个完整的、立体的、多层次的网络安全防御体系。
短句来源
     (2)Design the security supports platform against the network inner part of behavior abuse and the malicious attack of the network exterior, including virus protection, identity verification, access control, message encryption, security audit, intrusion detection, loopholes scanning and security management, etc. , thus setting up the all-directions safe terrace of the city class electronics governmental affairs system.
     (2)另设计了安全辅助支撑平台以防范网络内部的行为滥用和网络外部的恶意攻击,安全辅助支撑平台包括:病毒防护、信息加密、信息完整性校验、入侵检测、漏洞扫描、安全保密管理等安全技术和管理措施在内的一整套解决方法,目的是建立一个完整的、立体的、多层次的网络安全防御体系,从而构建市级电子政务系统全方位的安全平台。
短句来源
     This paper researches the safe mechanism of remote proxy server, especially data transmission mechanism, from interconnect remote teaching network system, and puts forward a whole set of data safety ensuring of proxy server on the basis of a serial of experiment results in antivirus invading, such as verification and message encryption, real-time invading examination, IP layer encryption and antivirus invading, etc. so as to guarantee the design and implementation of data safe system of proxy server.
     结合互联远程教学网系统对远程教学代理服务的安全机制,特别是数据传输机制展开研究,在认证和信息加密、实时侵入检测、IP层加密、防病毒侵入等一系列反破坏性实验结果的基础上,提出了一整套代理服务器的数据安全保障方案,以保证代理服务器数据安全系统的设计与实现。
短句来源
  报文传输加密
     Based on the background of inside river port EDI, this paper discuss the EDI message encryption and identity authentication skill in the transportation, also includes how to use the CA indication center to solve the identity authentication and encryption skill of the EDI system.
     本文以内河港航散杂货运输 EDI为背景 ,探讨了 EDI报文传输加密和身份认证的技术 ,以及 CA认证中心在 EDI报文身份认证中的应用技术
短句来源
  “message encryption”译为未确定词的双语例句
     In security module, the security technology of user authentication, message encryption, audit tracing and access control is used.
     在安全模块中,使用了用户认证、通讯加密、审计追踪、访问控制等安全技术,并且引入了模糊控制与专家系统。
短句来源
     The communication channel is always wireless for formation alliance combat in C~3I system,and the message encryption & decryption depend on specialcipher machine.
     在C3I系统中,多舰协同或编队联合作战时的通信信道一般是无线信道,保密机制一般借助专用密码机对报文信息进行加解密处理。
短句来源
     A Message Encryption with DES Can Be Read, AES Come into Being
     DES已被攻破,AES即将诞生
短句来源
     How to implement digital signature on the Smart card or Token is a key issue. Based on contact smart card standards and series standards of PKCS(Public Key Cryptographic Standard),this paper implemented the RSA(a kind of public key asymmetric algorithm) digital signature、identification、message encryption、keys distribution,especially emphasized on analyzing some key questions about how to realize RSA on the Smart card practically,and present several method scheme.
     本文根据接触式智能卡系列标准及PKCS (PublicKeyCryptographicStandard)系列相关标准 ,成功实现了智能卡操作系统上的RSA(一种非对称公钥密码算法 )算法下的数字签名、身份认证、信息加解密、密钥分配 ,并着重解析了应用中智能卡RSA算法实现方面的关键问题 ,提出了若干解决方案
短句来源
     Moreover, in SDS message encryption, a block cipher in CBC mode is used to calculate the cryptographically secure checksum, which is sufficient to test the integrity.
     在短信息端-端加密应用中,密码分组链接模式用来实现密码校验和的计算,该校验和用来确保数据的完整性。
短句来源
更多       
查询“message encryption”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  message encryption
The ZigBee wireless interface on the Telos platform supports hardware message encryption that can be used to protect WBAN communication.
      
NLSv2 offers message encryption or message integrity protection or both.
      
Message encryption is done via an elliptic curve cryptography engine supplied by Certicom Corporation.
      
Message encryption can be done using conventional or public-key encryption schemes.
      
It has specified the mechanism on SOAP signature, message encryption and authenticated tokens to provide security technologies for Web Services.
      
更多          


In June, 1997, it is the first time anyone has publicly shown that a message encryption with DES can be read. In this paper, we introduces DES with its development, and something about attacking DES by using spare CPU time from thousands of ordinary PCs on the Internet. At the beginning of 1997, a process to develop a Federal Information Proceeding Stan-dard(FIPS) for Advanced Encryption Standard(AES) is being initiated by the National Institute of Standard and Technology(NIST). A call for AES Candidate...

In June, 1997, it is the first time anyone has publicly shown that a message encryption with DES can be read. In this paper, we introduces DES with its development, and something about attacking DES by using spare CPU time from thousands of ordinary PCs on the Internet. At the beginning of 1997, a process to develop a Federal Information Proceeding Stan-dard(FIPS) for Advanced Encryption Standard(AES) is being initiated by the National Institute of Standard and Technology(NIST). A call for AES Candidate Algorithms has published all over the world. This paper introduces the draft of AES evaluation criteria.

介绍了DES及其发展,以及利用Internet联网计算机的空闲CPU时间攻破DES的情况。从1997年初,美国已经开始计划建立新的加密标准AES,并在世界范围内公开征集AES算法。本文对此也作了介绍,并介绍了AES标准的提纲。

The main functions of the public key infrastructure including management of registration, certificates and secret keys, as well as certificate authority are described. Some critical techniques involving message completeness check, digital signatures and message encryption are discussed.

介绍公钥基础结构体系的数据加密和创建数字认证的两大功能 ,对 PKI所涉及的信息完整性验证、数字签名技术和信息加密等关键技术进了探讨 ,表明公钥基础结构安全标准是网络通信安全赖以存在的基础结构。

Being a B2B model in the electronic trade application, EDI (Electronic Data Interchange) is becoming more and more widely used. The secure transportation and identity authentication of EDI message are the key part of the EDI's application and development. Based on the background of inside river port EDI, this paper discuss the EDI message encryption and identity authentication skill in the transportation, also includes how to use the CA indication center to solve the identity authentication and encryption...

Being a B2B model in the electronic trade application, EDI (Electronic Data Interchange) is becoming more and more widely used. The secure transportation and identity authentication of EDI message are the key part of the EDI's application and development. Based on the background of inside river port EDI, this paper discuss the EDI message encryption and identity authentication skill in the transportation, also includes how to use the CA indication center to solve the identity authentication and encryption skill of the EDI system.

作为 B2 B模式的电子商务的实现手段 EDI(电子数据交换 )正在得到日益广泛的使用 .EDI报文信息的安全传输和身份认证是 EDI应用推广的关键 .本文以内河港航散杂货运输 EDI为背景 ,探讨了 EDI报文传输加密和身份认证的技术 ,以及 CA认证中心在 EDI报文身份认证中的应用技术

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关message encryption的内容
在知识搜索中查有关message encryption的内容
在数字搜索中查有关message encryption的内容
在概念知识元中查有关message encryption的内容
在学术趋势中查有关message encryption的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社