助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   secure 在 电信技术 分类中 的翻译结果: 查询用时:0.189秒
图标索引 在分类学科中查询
所有学科
电信技术
互联网技术
计算机软件及计算机应用
工业经济
企业经济
金融
铁路运输
安全科学与灾害防治
更多类别查询

图标索引 历史查询
 

secure
相关语句
  安全
    Investigation on the Related Problems in Secure Authentication and Protocols for Communication Systems
    通信安全认证与保密协议相关问题研究
短句来源
    Research of Secure Secret Sharing and Its Applications
    安全秘密共享及其应用研究
短句来源
    Research of the Secure Computing Based on Java USIM Card
    Java USIM卡安全计算研究
短句来源
    Research on Secure Group Communication in Ad-Hoc Networks
    自组网络环境下的安全群组通信技术研究
短句来源
    Research on the Structure and Algorithm of IR-UWB Secure Communication Receiver
    基于IR-UWB安全通信接收机结构与算法理论研究
短句来源
更多       
  保密
    Research on Application of Chaotic Technology to Contemporary Secure Communication
    混沌技术在现代保密通信中的应用研究
短句来源
    Investigation on the Related Problems in Secure Authentication and Protocols for Communication Systems
    通信安全认证与保密协议相关问题研究
短句来源
    Research on Synchronization of Chaotic System and It's Application in Secure Communication
    混沌同步控制及在保密通信中的应用研究
短句来源
    Research on Chaotic Secure Communication System
    混沌保密通信系统的研究
短句来源
    Control and Synchronization of Chaotic Systems and Applications in Secure Communication
    混沌系统的控制与同步及其在保密通信中的应用
短句来源
更多       
  安全的
    Compared with those protocols based on the Random Oracle model, provable secure EKE (encrypted key exchange) protocols have heavier computation burden and their descriptions are more complex, although they don’t need the Random Oracle model.
    与Random Oracle模型下的协议相比,标准模型下可证安全的EKE(encrypted key exchange)协议虽然不需要Random Oracle假设,但它们都对参与方的计算能力要求较高,协议规则也更为复杂.
短句来源
    Through introducing server’s public key and applying ElGamal encryption scheme and pseudorandom function ensemble, a provable secure encrypted key exchange protocol is designed from the protocol proposed by David P. Jablon in the paper of “Extended Password Key Exchange Protocols Immune to Dictionary Attacks”, and a proof is presented.
    从David P.Jablon在“Extended Password Key Exchange Protocols Immune to Dictionary Attacks”一文中提出的协议出发,通过引入服务端的公钥,并利用ElGamal加密和伪随机函数集,将一个Random Oracle模型下可证安全的EKE协议改进为一个标准模型下可证安全的EKE协议,并证明了改进后的协议仍然是安全的.
短句来源
    This paper analyzes the security aspects of SNMPv1 and SNMPv3 according to the five kinds of security service introduced by NSA IATF and brings forward some methods and proposals on how to implement secure network management with SNMP.
    本文结合NSA IATF提出的五项安全服务详细分析了SNMPv1和SNMPv3的安全性,最后就如何利用SNMP实现安全的网络管理提出了若干方法和建议。
    Design of secure authenticated key distribution protocols
    安全的认证密钥分配协议设计
短句来源
    A Secure Group Signature Scheme
    一种安全的组签字方案
短句来源
更多       
  “secure”译为未确定词的双语例句
    Study on the Public Key Cryptosystem Secure Against Chosen Ciphertext Attack
    抗选择密文攻击公钥密码体制的研究
短句来源
    The Encryption Methods in ECPS2 and ECPS3 Are Not Secure
    ECPS2和ECPS3中的加密也是不安全的
短句来源
    Transient Analysis of Chaos Driving Synchronization and Its Application in Secure Communications
    混沌电路同步的瞬态分析及在通信中的应用
短句来源
    Chaos-Shift-Keying Secure Digital Communications Using Feedbackto Synchronize Chua's Circuit
    Chaos-Shift-Keying Secure Digital Communications Using Feedback to Synchronize Chua's Circuit
短句来源
    This paper analyzes the chaotic stream cipher proposed in “Chaos-based secure communication in a large community”, it finds that the frontal values of the encryption sequence of the stream cipher are not sensitive to the least significant bits of the key.
    对Wang Shihong的“Chaos-based secure communication in a large community”一文提出的混沌序列密码算法进行了分析,发现该加密算法产生的加密乱数序列的前若干值对密钥低位比特的变化不敏感。
短句来源
更多       
查询“secure”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  secure
A secure model for mobile agent based on encrypted circuit construction
      
A dynamic, secure, and efficient group key agreement protocol
      
The key challenge of dynamic peer communication is how to realize secure and efficient group key management.
      
The protocol is proven secure against passive attack by using indistinguishable method.
      
By checking whether these variables are influenced by outside inputs, the database operations are proved to be secure or not.
      
更多          


This paper presents a new type of public key cryptosystem. This new system provides both secure communications and digital signatures over an insecure communication channel. Even though some secret keys of the system may be known, the security of this system is unlikely to be broken and thus secure communication may continue even in this event.

本文提出了一种新型公开密钥保密通信方案。该方案利用现有不保密通信信道提供双用户或多用户之间的可靠的保密通信和数字签名。论证表明新方案的加密变换几乎是不可被破译的,整个系统的工作不会因部分秘密密钥的泄露而受到任何破坏。

This paper discusses the bit security off knapsack-based public key cryptosystems and establishes the equivalence between the security of some particular bits in the plaintext and the plaintext itself. Furthermore, a new public key cryptosystem based on the knapsack problem is presented. The system differs from the Alerkle-Hellman's scheme in that it does not involve any superillcreasing sequence of knapsack components. In addition, the system has a high density when choosing the system parameters properly....

This paper discusses the bit security off knapsack-based public key cryptosystems and establishes the equivalence between the security of some particular bits in the plaintext and the plaintext itself. Furthermore, a new public key cryptosystem based on the knapsack problem is presented. The system differs from the Alerkle-Hellman's scheme in that it does not involve any superillcreasing sequence of knapsack components. In addition, the system has a high density when choosing the system parameters properly. So it is secure against both Shamir's polynomial cryptoanalysis algorithm and Brickell's algorithm of solving low density knapsacks.

本文讨论了一般背包公钥密码系统的位安全性问题,建立了这种系统中原文整体和某些特定位的安全性的等价关系。提出了一个新的基于背包问题的公钥系统,且不涉及任何背包分量超递增序列,与Merkle-Hellman系统有着本质的区别。此外,适当选择参数时,系统密度可达很高。因而,现有的Shamir的破译算法和Brickell解低密度背包问题的算法对该系统均无效。

When the sender and receiver of a secure communication system are not trust on each other, the cryptography has not only to solve the message signature problem of sender, but also to prevent the receiver from refusing having been some valuable information served. First, the paper proposes the idea of received signature. Then, a practical realization of received signature protocol is given. Also, the security of the protocol is analysed. Anyhow, the new protocol uses the trusted third party to ensure the...

When the sender and receiver of a secure communication system are not trust on each other, the cryptography has not only to solve the message signature problem of sender, but also to prevent the receiver from refusing having been some valuable information served. First, the paper proposes the idea of received signature. Then, a practical realization of received signature protocol is given. Also, the security of the protocol is analysed. Anyhow, the new protocol uses the trusted third party to ensure the security of the signature.

在收、发双方互不信任的保密通信系统中,密码技术不但要解决发方对数据的签字问题,还必须防止收方拒绝承认收到有效信息数据。本文提出了接收签字的概念,同时给出了一种具体实现接收签字的密码协议,并对其安全性进行了讨论。新协议引用了公证处作为签字可靠性的保证。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关secure的内容
在知识搜索中查有关secure的内容
在数字搜索中查有关secure的内容
在概念知识元中查有关secure的内容
在学术趋势中查有关secure的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社